menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Securityaffairs

2w

read

216

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION

  • Rhysida Ransomware gang claims hack of the Government of Peru & DragonForce group claims data theft after Co-op cyberattack.
  • U.S. CISA adds multiple new vulnerabilities to its Known Exploited Vulnerabilities catalog, including Yii Framework, Commvault Command Center, SonicWall SMA100, and Apache HTTP Server flaws.
  • Luxury department store Harrods and Canadian electric utility Nova Scotia Power suffer cyberattacks. Pro-Russia hacktivist group targets Dutch organizations.
  • Various cybersecurity incidents reported, including phishing domains associated with LabHost PhaaS platform, critical vulnerabilities actively exploited in the wild, and emergence of new malware strains targeting different sectors.

Read Full Article

like

13 Likes

source image

Securityaffairs

2w

read

395

img
dot

Image Credit: Securityaffairs

Rhysida Ransomware gang claims the hack of the Government of Peru

  • The Rhysida Ransomware gang claims responsibility for hacking the Government of Peru through the Gob.pe platform.
  • The group has published images of documents allegedly stolen from the Peruvian government platform and is demanding a ransom of five bitcoins within seven days.
  • Rhysida ransomware group has been active since May 2023, targeting numerous organizations across various sectors, including education, healthcare, manufacturing, information technology, and government.
  • In response to the attacks, the FBI and CISA issued a joint Cybersecurity Advisory warning about Rhysida ransomware and providing information on tactics, techniques, and procedures associated with the group.

Read Full Article

like

23 Likes

source image

Securityaffairs

2w

read

243

img
dot

Image Credit: Securityaffairs

DragonForce group claims the theft of data after Co-op cyberattack

  • Hackers claiming to be DragonForce revealed that they stole major customer and employee data from the recent Co-op cyberattack, providing proof to the BBC.
  • Initially, Co-op stated there was no evidence of customer data compromise, but later confirmed that current and past members' data was accessed by threat actors.
  • The attackers accessed Co-op's internal Teams, leaked staff credentials, and obtained 10,000 customer records containing personal details like names, addresses, emails, and phone numbers.
  • DragonForce group, also responsible for attacks on M&S, claimed to have information on 20 million Co-op members, indicating potential risk to Co-op's membership scheme.

Read Full Article

like

14 Likes

source image

Kitploit

2w

read

165

img
dot

Image Credit: Kitploit

Liam - Automatically Generates Beautiful And Easy-To-Read ER Diagrams From Your Database

  • Liam ERD automatically generates beautiful and easy-to-read ER diagrams from your database.
  • It offers a clean design, intuitive features for understanding complex databases, simple reverse engineering, effortless setup with zero configuration, and high performance for small and large projects.
  • Users can visualize database schemas with ease, handle over 100 tables, and contribute to the fully open-source project to shape it for their needs.
  • For public repositories, users can insert a specific URL into their schema file, while for private repositories, they can run an interactive setup using 'npx @liam-hq/cli init'.

Read Full Article

like

9 Likes

source image

Securityaffairs

2w

read

399

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Yii Framework and Commvault Command Center flaws to its Known Exploited Vulnerabilities catalog

  • U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Yii Framework and Commvault Command Center flaws to its Known Exploited Vulnerabilities catalog.
  • Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028) and Yiiframework Yii Improper Protection of Alternate Path Vulnerability (CVE-2024-58136) were among the vulnerabilities added.
  • Threat actors exploited Craft CMS vulnerabilities, including an RCE in Craft CMS and an input validation flaw in the Yii framework, to upload a PHP file manager and compromise servers.
  • CISA orders federal agencies to fix the vulnerabilities by May 23, 2025, following the Binding Operational Directive 22-01 to address Known Exploited Vulnerabilities.

Read Full Article

like

24 Likes

source image

Hackingblogs

2w

read

252

img
dot

Image Credit: Hackingblogs

Apple Spyware Alert: Targeted Surveillance Hits Victims in 100 Countries

  • Apple has issued a warning about spyware attacks in 100 countries, targeting journalists, activists, and political figures.
  • These attacks are specific, intimate, and forceful, focusing on individuals for who they are and what they do.
  • Mercenary spyware allows attackers complete access to texts, calls, and even device microphones and cameras.
  • Apple notified impacted customers of spyware hijacking their iPhones, indicating targeted monitoring.
  • Victims reported the use of sophisticated Paragon spyware, highlighting the evolving threat of such malware.
  • Journalists, activists, and political critics are among the high-value targets of these spyware attacks.
  • The spyware quietly invades devices, collecting sensitive data without user awareness or approval.
  • Once installed, the spyware gives attackers full control of the hacked device, turning smartphones into surveillance tools.
  • To stay safe, regularly update operating systems, use 2FA, employ end-to-end encryption, and avoid clicking on unknown links.
  • If you suspect spyware infection, a factory reset can help remove it, but remember to back up data and change passwords.

Read Full Article

like

15 Likes

source image

Securityaffairs

2w

read

243

img
dot

Image Credit: Securityaffairs

Ireland’s DPC fined TikTok €530M for sending EU user data to China

  • Ireland’s Data Protection Commission (DPC) fined TikTok €530 million for violating data rules by sending European user data to China.
  • TikTok violated GDPR by transferring EEA user data to China and lacking transparency. It was given 6 months to comply with data rules or face suspension of data transfers to China.
  • The DPC found TikTok violated GDPR by failing to ensure EEA user data transferred to China had protections equal to EU standards. TikTok was ordered to suspend these transfers and comply with GDPR within six months.
  • TikTok disagrees with the decision, citing its €12 billion Project Clover data protection initiative. In September 2023, the DPC fined TikTok €345 million for violating children's privacy.

Read Full Article

like

14 Likes

source image

Macdailynews

2w

read

163

img
dot

Image Credit: Macdailynews

Apple notifies iPhone users in 100 countries of spyware attacks

  • Apple has notified iPhone users in 100 countries about potential spyware attacks targeting them.
  • Users like Italian journalist Ciro Pellegrino and Dutch activist Eva Vlaardingerbroek received alerts from Apple regarding targeted mercenary spyware attacks.
  • Lockdown Mode, an extreme protection feature for highly targeted individuals, has been introduced by Apple to limit attack surface and enhance security.
  • Apple's announcement of a $100 billion share repurchase program and better-than-expected job growth in America were also highlighted in the news.

Read Full Article

like

9 Likes

source image

Hackers-Arise

2w

read

344

img
dot

Image Credit: Hackers-Arise

Open-Source Intelligence (OSINT): Unmasking YouTube with OSINT Tools!

  • YouTube is a valuable source of intelligence for digital investigations, requiring effective search techniques.
  • Understanding how YouTube indexes content is crucial, focusing on elements like video title, description, tags, subtitles, etc.
  • Mastering YouTube search operators such as quotation marks, plus/minus signs, vertical bar, asterisk, etc., enhances search precision.
  • Utilizing search filters like intitle, allintitle, description, before, after helps narrow down search results efficiently.
  • Google can be used to search YouTube effectively by combining the site: operator with specific search terms.
  • Specialized OSINT tools like YouTube Metadata Viewer, Deleted Video Finder, and YouTube GeoFind further enhance YouTube investigation capabilities.
  • Extracting intelligence from YouTube requires advanced search techniques and tools beyond basic functionality.
  • The post highlights the importance of mastering YouTube search techniques and leveraging specialized tools for OSINT purposes.
  • Improving OSINT skills through training programs like the OSINT Investigator Bundle is recommended for cyberwarriors.
  • YouTube's vast user-generated content can be a goldmine for investigations with the right search strategies and tools.

Read Full Article

like

20 Likes

source image

Kitploit

2w

read

309

img
dot

Image Credit: Kitploit

SubGPT - Find Subdomains With GPT, For Free

  • SubGPT is a tool that uses BingGPT to find subdomains based on the ones already discovered for a domain.
  • The tool is free to use and can help in discovering additional subdomains.
  • Installation can be done via pip or by cloning from GitHub, and a Bing cookie is required for the tool to function.
  • Users need to ensure their subdomains list contains subdomains from only one domain and be mindful of Bing's daily limit when using SubGPT.

Read Full Article

like

18 Likes

source image

Securityaffairs

2w

read

56

img
dot

Image Credit: Securityaffairs

Microsoft sets all new accounts passwordless by default

  • Microsoft announced that all new accounts will be “passwordless by default” to enhance security measures against various cyber attacks.
  • New users will have multiple passwordless options for account sign-ins and will not need to set up a password.
  • Microsoft's revamped login system prioritizes passwordless methods like one-time codes and passkeys for heightened security and user experience.
  • This shift towards a passwordless future aims to improve security, reduce password usage by over 20%, and make sign-ins faster and more secure.

Read Full Article

like

3 Likes

source image

Securityaffairs

2w

read

191

img
dot

Image Credit: Securityaffairs

Luxury department store Harrods suffered a cyberattack

  • Luxury department store Harrods confirmed a cyberattack, making it the third major UK retailer targeted in one week.
  • The cyberattack involved attempted unauthorized access to some of Harrods' systems, prompting immediate proactive steps from the IT security team.
  • Harrods restricted internet access at its sites but maintained operations, including its Knightsbridge store and online platform.
  • Technical details of the attacks on Harrods were not disclosed, and it remains uncertain if a data breach occurred. The attacks on Marks and Spencer and the Co-op were also mentioned in the context of recent retail cyberattacks.

Read Full Article

like

11 Likes

source image

Securityaffairs

2w

read

26

img
dot

Image Credit: Securityaffairs

U.S. CISA adds SonicWall SMA100 and Apache HTTP Server flaws to its Known Exploited Vulnerabilities catalog

  • U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SMA100 and Apache HTTP Server flaws to its Known Exploited Vulnerabilities catalog.
  • CISA also added Qualitia Active! Mail, Broadcom Brocade Fabric OS, and Commvault Web Server flaws to its Known Exploited Vulnerabilities list.
  • CVE-2024-38475 is an Apache HTTP Server vulnerability allowing URL mapping to permitted file locations. CVE-2023-44221 is a SonicWall SMA100 vulnerability enabling OS Command Injection.
  • SonicWall has addressed these flaws with firmware updates for affected devices, and organizations are advised to review and address vulnerabilities in their infrastructure.

Read Full Article

like

1 Like

source image

Kitploit

2w

read

200

img
dot

Image Credit: Kitploit

Uro - Declutters Url Lists For Crawling/Pentesting

  • Uro is a tool designed to declutter URL lists used for crawling or security testing by removing uninteresting or duplicate content.
  • It filters out incremental URLs, blog posts, URLs with parameter value differences, and 'useless' files such as images, JS, and CSS.
  • It can be easily installed using pipx and offers basic usage by feeding data through stdin or advanced features like reading from a file, whitelisting or blacklisting extensions, and applying filters for granular control.
  • Users can customize the filtering process by specifying whitelist, blacklist, and filters like hasparams, noparams, hasext, noext, allexts, keepcontent, keepslash, and vuln.

Read Full Article

like

12 Likes

source image

Securityaffairs

2w

read

74

img
dot

Image Credit: Securityaffairs

Pro-Russia hacktivist group NoName057(16) is targeting Dutch organizations

  • Pro-Russia hacktivist group NoName057(16) is targeting Dutch organizations with large-scale DDoS attacks, as warned by the National Cyber Security Center (NCSC).
  • Recent DDoS attacks by the group are believed to be in retaliation for the Netherlands' military aid to Ukraine, causing disruptions to municipal and provincial websites in the country.
  • NoName057(16) has a history of targeting government and critical infrastructure organizations worldwide, using tools like the Bobik botnet for DDoS attacks.
  • The hacktivist group operates in waves, intensifying attacks during periods of geopolitical tensions, such as supporting Ukraine in military or diplomatic ways.

Read Full Article

like

4 Likes

For uninterrupted reading, download the app