hacking

  1. Father

    Ethical hacking: what is it and where is it used? Who are the white hackers?

    Table of contents How to become an Ethical Hacker How is hacker ethics measured? Current situation with Bug Bounty in Russia Conclusion Hacking is a kind of flagship of media information security. Cult films are made about hackers. Many teenagers and aspiring IT professionals are eager to...
  2. Father

    Hacking as a business. Why do we need subscription hackers and how much does it cost?

    This year, many researchers are talking about an increase in business interest in cybersecurity and its tools. This process is largely due to the actualization of information security risks, which are based on a number of factors, from geopolitical tensions to simplifying access to malware and...
  3. Father

    "Sports" hacking: types and benefits

    In this article, we tell you what kind of cyber training sessions there are, who cyber games are organized for, and what benefits they bring to companies and participants. The number of targeted cyber attacks targeting companies and enterprises in Russia has been increasing recently. They are...
  4. Father

    Targeted by hackers: how to protect yourself from hacking video cameras and ensure your privacy

    On the one hand, video surveillance cameras are designed to increase the level of security and control, but on the other hand, they are vulnerable to intruders and can pose a threat to their owners. Cybersecurity experts told Cyber Media how cybercriminals gain access to cameras, what it...
  5. Father

    We won't be hijacked: how to protect your Telegram account from hacking and theft

    There is an opinion that Telegram is one of the most secure instant messengers. Nevertheless, attackers have long learned how to hack and steal accounts, gain access to personal correspondence and chat content. How this happens, why someone should hack your Telegram account, and how to protect...
  6. Father

    Hacking as a business. Why do we need subscription hackers and how much does it cost?

    This year, many researchers are talking about an increase in business interest in cybersecurity and its tools. This process is largely due to the actualization of information security risks, which are based on a number of factors, from geopolitical tensions to simplifying access to malware and...
  7. Father

    Hacking Change Healthcare: the cause of a large-scale failure in the work of US medical institutions was discovered

    A good example of how a vulnerability in software has paralyzed American medicine. In February, a high-profile cyber attack on Change Healthcare caused serious disruptions in the work of US medical institutions, and now it has become known how hackers gained access to the systems. According to...
  8. Father

    Hacking CD Projekt RED and CISA: How HelloKitty Celebrates rebranding

    HelloKitty changes its name and gives players a Witcher 3 build. The operator of the ransomware program HelloKitty announced a change of name to HelloGookie and released passwords for previously leaked CD Projekt RED source codes, information about Cisco networks, and keys for decrypting data...
  9. Father

    The Fortinet bug has become the main tool of a new hacking campaign

    The negligence of administrators leads to theft of corporate data. Forescout has discovered a new campaign that exploits a vulnerability in Fortinet FortiClient EMS devices to spread malware. The SQL injection vulnerability CVE-2023-48788 (CVSS score: 9.8) allows an unauthorized attacker to...
  10. Father

    Hacking at the cost of $6,8 billion: US healthcare pays for the negligence of Change Healthcare

    UnitedHealth has shown by example that it is impossible to save money on cybersecurity. UnitedHealth, the parent company of Change Healthcare, which was affected by the ransomware attack, reported that the total cost of eliminating the consequences of the cyber attack for the first quarter of...
  11. Father

    Private key theft and server hacking: a critical vulnerability was discovered in PuTTY

    Update the client version before it's too late. PuTTY warn about a critical vulnerability affecting versions from 0.68 to 0.80. The flaw may allow an attacker to fully recover NIST-P521 private keys. Vulnerability CVE-2024-31497 occurs due to failures in the generation of cryptographic ECDSA...
  12. Father

    YubiKey Manager breach or how Microsoft Edge saves users from hacking

    A browser with an aggressive promotion policy suddenly became the main information security hero for everyone. Yubico, the developer of popular YubiKey authentication devices, has warned Windows users about a serious vulnerability in its software. According to the company's official...
  13. Father

    Wukong Quantum Shield: Chinese supercomputer now invulnerable to hacking

    Wukong can now conduct a full-fledged quantum war with other systems. Chinese quantum computer Origin Wukong received a new protection against attacks of quantum systems 3 months after access to it was opened to the whole world. Origin Wukong, China's first third-generation superconducting...
  14. Father

    Amazon engineer Convicted of hacking and stealing $5 million

    Ahmed's case is the first of its kind that the U.S. Attorney's Office has faced. Shakib Ahmed, a New Yorker, was sentenced to 3 years in prison for hacking two crypto exchanges and stealing more than $5 million worth of cryptocurrencies. According to the prosecutor's office, this is the first...
  15. Father

    AI protected: Microsoft introduces new features to combat hacking of neural networks

    Spotlighting and Watchdog are designed to be a key link in protecting user data when communicating with chatbots. Microsoft announced the creation of new technologies aimed at countering threats related to hacking AI systems. The AI Spotlighting and AI Watchdog functions will protect against...
  16. Father

    Hackers in your living room: 90,000 LG TVs are a new target for hacking

    Several vulnerabilities in webOS at once unleash the hands of cybercriminals. Researchers from Bitdefender discovered four vulnerabilities in several versions of webOS, the operating system used in LG smart TVs. These flaws allow attackers to gain unauthorized access and control over devices at...
  17. Father

    Kaspersky Lab confirms hacking of the fan club: reset your password immediately

    Data from almost 57,000 users ended up online. According to open sources, the Kaspersky Lab fan club forum was hacked, as a result of which the RGB hacker group made public the personal data of 56,798 users. The forum is a popular platform for discussing Kaspersky Lab products, sharing...
  18. Father

    Acuity confirms hacking: data of State Department, NSA and FBI employees stolen

    The US government contractor specified what information fell into the hands of hackers. Acuity, a US government contractor, confirmed that its GitHub repositories were hacked, as a result of which the attackers stole documents. According to the company, the stolen information was "outdated and...
  19. Father

    In Russia, a pensioner is accused of piracy for hacking the Sony console

    Quite often, the Russian authorities make extremely contradictory statements. For example, back in 2022, it was proposed to officially lift the ban on downloading pirated software, games and other intellectual property of foreign companies that left the Russian market. The idea was in the air...
  20. Father

    Users of Telegram bots BONKbot and Solareum lost $520,000 due to hacking

    The trading Telegram bot BONKbot on the Solana network was allegedly subjected to a hacker attack, as a result of which users lost about $208,000. CertiK analysts drew attention to multiple reports of losses and allowed a possible leak of private keys. The exact cause of the exploit remains...
Top