Items tagged with Hacking

More details continue to emerge regarding the hacking incident involving NVIDIA and a  group taking credit for the security breach, Lapsus (or "LAPSU$" as the entity prefers to stylize it). Days after the breach hit headlines, NVIDIA has confirmed the incident, noting that some proprietary information was indeed... Read more...
This week, the Cybersecurity and Infrastructure Security Agency (CISA) published a “Free Cybersecurity Services and Tools” webpage outlining what can be done for security incidents, intrusions, preparation, and resilience against cyberattacks. This is intended to be a “one-stop resource where organizations of all... Read more...
It seems Bowser always has Princess Peach locked up in another castle, and he really should be held accountable for that. There's also a real life Bowser linked to Nintendo, but in a much different way. His name is Gary Bowser, and he just received a 40-month prison sentence for his role in creating and selling... Read more...
Even with malware attacks against Linux on the rise, a major security vulnerability has somehow been lurking in every Linux distribution for a dozen years. Just hours after the bug became public, a proof-of-concept (PoC) exploit showed up in the wild. The problem lies within a system utility called Polkit, which... Read more...
To the casual observer, the world of cryptocurrency may seem like the modern version of the Wild West. It definitely doesn't help the optics when hackers infiltrate one of the leading cryptocurrency exchanges, Crypto.com, and swipe $15 million worth of Ethereum, as a blockchain security and data analytics company... Read more...
When St. Louis Post-Dispatch reporter Josh Renaud reported a serious security problem with a State of Missouri website, he thought he was doing the Department of Elementary and Secondary Education (DESE) a favor. Missouri Governor Mike Parson didn’t see it that way, and now wants to prosecute the journalist. In spite... Read more...
Criminal ransomware distributors have evolved dramatically over the past few years. Operators that were once splinter groups or lone individuals have become highly sophisticated and organized. Security experts say it’s not getting any better, either. Rather, some say we’re in the “golden era of ransomware” and 2022... Read more...
In something that would seem straight out of a spy flick, Rostec, a Russian tech company has introduced a USB Flash drive that can destroy its NAND flash memory chips -- and hence the data stored on them -- using a built-in detonator. Technodynamika, which apparently falls under the umbrella of Rostec, are the ones... Read more...
A couple of weeks ago a hacker managed to infiltrate Robinhood's network and access email addresses and full names for millions of customers. The person who is purportedly responsible has now listed the stolen data for sale on a popular underground forum where they are seeking a payday of at least five figures... Read more...
For at least the second time in 2021, hackers have breached Acer's servers, this time plundering more than 60 gigabytes of data. Acer has confirmed that names, addresses, and phone numbers belonging to several million clients have been compromised in the breach, as well as sensitive corporate financial and audit... Read more...
Ransomware attacks are on the rise, and it may feel like there is no recourse for many victims. A new law has been proposed in the United States by Senator Elizabeth Warren and Congresswoman Deborah Ross to attempt to address that, but with an added dilemma. The new law, the Ransomware Disclosure Act, would require... Read more...
This week has seen its share of headlines concerning data breaches and leaks. Late last night Twitch reported on its blog page that its data breach was "due to an error in a Twitch server configuration change that was subsequently accessed by a malicious third party.”" They went on to say that they are working with... Read more...
The cybersecurity folks at Cloudflare have to be feeling like a million bucks right about now. Or make it a billion smackers. Either way, they are completely justified in reveling at staving off a massive distributed denial of service (DDOS) attack, the largest ever, in fact. It happened earlier this summer, only you... Read more...
High-reward ransomware appears to be all the rage right now after the REvil hacking group executed the Kaseya attack, encrypting over 1,500 businesses. Now, Saudi Aramco has confirmed a data leak today following an extortionist who demanded $50 million after claiming to have sized a large quantity of data from the... Read more...
Late last week, it was revealed that a global spyware campaign was targeting politicians, activists, and journalists worldwide. Initially, the company behind the software for spying, NSO Group, was blamed for the data leak and supplying its software to authoritarian regimes. However, NSO Group has since rejected these... Read more...
The devastating security breach publisher Electronic Arts disclosed earlier this month may have been worse than initially thought. Not in terms of the scope of how much data was stolen (which is a lot), but in regards to EA possibly having prior knowledge that its systems were at risk, and allegedly choosing not to... Read more...
Cybersecurity is a hot topic nowadays, with attacks happening frequently like the Colonial Pipeline or JBS Global ransomware attacks. Now, it appears that EA is facing its own issues after hackers allegedly managed to exfiltrate around 780GB of source code, frameworks, and engine tools from the company. Recently... Read more...
In May, the biggest fuel provider to the U.S. eastern seaboard was hit with ransomware from Russian hacking group DarkSide. Colonial Pipeline decided to pay the ransom to decrypt some of its files to get back to operational status, but those efforts were hampered by a slow decryption tool offered by the attackers... Read more...
Well, that was incredibly fast. Apple released its AirTag trackers to retail less than two weeks ago, and someone has already hacked the tiny gadget. Security researcher Thomas Roth did the deed, as he managed to crack into the microcontroller and re-flash it with his own custom firmware, essentially resulting in a... Read more...
When it comes to password management, users really have just a handful of options, and all of them have their caveats. If we choose to just use memorable passwords and recycle them between accounts, one account becoming compromised can lead to a group of them being in a bad state. On the other hand, relying on a cloud... Read more...
The hacker who gained unauthorized access to CD Projekt Red's servers and seemingly stole the source code for several games has already reportedly leaked one of them, after the developer publicly declared it had no intention of paying a ransom or negotiating. In addition, the hacker appears to be trying to start a... Read more...
FireEye, a prominent cybersecurity firm, says it is working with the US Federal Bureau of Investigation and several key partners, including Microsoft (which recently warned of a rise in cyberattacks), into a highly sophisticated and targeted hack that it believes was perpetrated by a state-sponsored actor "with... Read more...
Prev 1 2 3 4 5 Next