Avsnitt
-
Elon Musk has become a controversial political figure, leaving little surprise that one of his projects, the X platform, became a target for a hacktivist group, leaving the major social media platform down from a DDoS attack.
Sources: https://pastebin.com/Pa6b0nrm
-
Ransomware groups sometimes run into issues, like being blocked by security tools, and often have to pivot. Some techniques are less conventional than others, but are just as destructive. Here's how a webcam led to ransomware being deployed org wide.
Sources: https://pastebin.com/FHxVYgBg
-
Saknas det avsnitt?
-
Building access management is an important part of physical security that has only become more intelligent. However, with all the data on these systems that exist on employees it is important that they are properly secured. Recently, 49,000 systems were found unsecured on the open internet with data viewable, and sometimes modifiable.
Sources: https://pastebin.com/8feGBvEu
-
Government contractors are expected to follow certain compliance policies, so what happens when a company lies about compliance? Hefty fines tend to follow.
Sources: https://pastebin.com/vJPEikD9
-
SWATting is a dangerous crime that involves making extreme police reports against people to illicit a response from the SWAT team. This has resulted in innocent people being killed or injured. One teen turned making these reports into a business and was recently sentenced to 4 years in prison for it. Learn about his crimes and methodology today.
Sources: https://pastebin.com/ET9xMi85
-
Recently a new crypto stealing malware was found in apps on both the Google Play, and the famously restrictive Apple App Store, but it seems not to be its own app, but rather something inserted into existing apps at a later time to steal passphrases for crypto wallets from images on devices.
Sources: https://pastebin.com/fHgDP4fg
-
Recently a brand new generative AI model came out of nowhere and blew up overnight. There are a lot of controversies and concerns surrounding this model, providing more efficient AI but also bringing a lot of data sensitivity risks and topics of government censorship to the forefront.
Sources: https://pastebin.com/WRGERYCE
-
Pwn2Own by TrendMicro's Zero Day Initiative is a hacking contest where people try to hack "up to date" products to discover zero day vulnerabilities in them and win cash prizes for doing so. The automotive version of this contest not only involved cars themselves, but chargers for electric vehicles.
Sources: https://pastebin.com/4siwYEYK
-
Job offer scams are sadly rather common, but most of the time it's a waste of time or an identity theft scam rather than a scam that installs unauthorized crypto miners on your devices. A new scam email impersonating Crowdstrike that is targeting developers does just that.
Sources: https://pastebin.com/Lpg673yh
-
The US Department of Treasury was targeted in a suspected state-sponsored hack. No ransomware was deployed, though the threat actors compromised machines remotely, linked to a BeyondTrust data breach and accessed many unclassified documents.
Sources: https://pastebin.com/rUi3Wdxg
-
Deepfakes and AI image and video generation have become nearly indistinguishable from real people to the naked eye. This creates a problem when it comes to identity verification that involves previously very difficult to fake Face ID systems. Recently a deep web identity fraud database was being build was scraped data and images with the intention to target financial accounts.
Sources: https://pastebin.com/X7acHzs9
-
The healthcare industry remains one of the top targeted by hackers, and even the biggest healthcare organizations are not safe.
Sources: https://pastebin.com/UgauFXsL
-
In 1999 one of the most infamous viruses was released on the world, slowing down email systems and causing chaos in the corporate world and among personal computer users.
Sources: https://pastebin.com/FgE9ETKk
-
Telecom providers across many countries have been compromised by an APT, which means your text messages may be vulnerable if you text people with different phones, due to insecurities in text message protocols. Fortunately there's some solutions.
Sources: https://pastebin.com/pMnEP6Lj
-
Game engines are used to help developers create games we love, but where code can be written, malware can be written, and one group has figured out a way to exploit the Godot game engine to discreetly package malware that often goes undetected.
Sources: https://pastebin.com/5b3LcJpW
-
A hacking group boasted about breaching car manufacturer Ford's network and stealing data on 44,000 customers, selling it for 2 dollars on hacking forums for everyone to enjoy. The only problem? That data isn't exactly what they claimed.
Sources: https://pastebin.com/d7r88Q7m
-
Simple misconfiguration can often lead to disaster, and sometimes that disaster is a threat actor sneakily taking over your trusted website and using it to host malware, send phishing emails, or control botnets. Here's a surprisingly easily exploited DNS oversight that has allowed threat actors to take over 70,000 websites.
Sources: https://pastebin.com/DqXL1BRb
-
Ransomware groups typically request payments in the form of crypto, but newcomers Hellcat wanted to get this bread in a more literal sense. So why bread? There may be a more realistic reason than you'd think...
Sources: https://pastebin.com/kAkdLJD5
-
There's all sorts of online shopping scams, but one of the newest ones discovered exploits legitimate eshops by creating fake product listings on other people's websites and redirecting shoppers to an attacker-controlled page that will steal credit card data.
Sources: https://pastebin.com/VS9XFHRF
-
The Flipper Zero is a notorious hacking tool used to wreak havoc on traffic lights, banks, locks, and cars. Or is it? What can the Flipper actually do, and is it really as dangerous as it seems on Tik Tok?
Sources: https://pastebin.com/cnJyQkXC
- Visa fler