menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Securityaffairs

1M

read

50

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 525 by Pierluigi Paganini – INTERNATIONAL EDITION

  • Silent Ransom Group targeting law firms, FBI warns.
  • Leader of Qakbot cybercrime network indicted in U.S. crackdown.
  • Operation RapTor results in arrest of 270 dark web vendors and buyers.
  • Chinese threat actors exploit Trimble Cityworks flaw to breach U.S. local government networks.

Read Full Article

like

3 Likes

source image

Securityaffairs

1M

read

350

img
dot

Image Credit: Securityaffairs

Operation ENDGAME disrupted global ransomware infrastructure

  • Operation ENDGAME coordinated by Europol and Eurojust dismantled global ransomware infrastructure from May 19 to 22, taking down 300 servers, 650 domains, and seizing €21.2M in crypto.
  • Law enforcement efforts included Europol setting up a Command Post in The Hague with investigators from various countries, leveraging Eurojust's support for effective judicial cooperation.
  • Authorities also seized €3.5M in cryptocurrency, targeting initial access malware strains like Bumblebee, Lactrodectus, Qakbot, and issuing 20 international arrest warrants for key operators.
  • Germany will list 18 suspects on the EU Most Wanted list, accused of providing tools for ransomware attacks, showcasing law enforcement's adaptability in disrupting ransomware services.

Read Full Article

like

21 Likes

source image

Hackersking

1M

read

356

img
dot

Image Credit: Hackersking

Trump Administration Cybersecurity Funding Cuts: A Risky Gamble?

  • The Trump administration's cybersecurity funding cuts during Donald Trump's presidency raised concerns among experts and officials, posing a potential threat to national security.
  • The 2021 budget proposal included significant reductions to the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), impacting cybersecurity research, incident response, and inter-agency coordination.
  • Programs crucial for defending against cyberattacks saw funding cuts, potentially limiting emergency responses and infrastructure security updates, especially concerning election security ahead of the 2020 U.S. Presidential elections.
  • Criticism from lawmakers and cybersecurity analysts highlighted the risks of emboldening nation-state actors like Russia, China, and Iran, as the U.S. lagged behind in global cybersecurity investments, emphasizing the importance of continuous investment in cybersecurity.

Read Full Article

like

21 Likes

source image

Hackersking

1M

read

386

img
dot

Image Credit: Hackersking

How Most Cyber Attacks Begin: The Hidden Dangers of Credential-Based Threats

  • Cyber threats are increasing in quantity and sophistication, posing risks of data breaches and financial losses.
  • More than 55% of breaches stem from credential attack vectors, including phishing, brute force attacks, and MFA bypass techniques.
  • Phishing attacks are the most dangerous aspect of cybersecurity, targeting user login information and financial data.
  • MFA bypass techniques involve methods like man-in-the-middle attacks and token pilfering to circumvent multi-factor authentication.
  • Brute force attacks involve continuously guessing combinations of usernames and passwords to gain unauthorized access.
  • Malware, zero-day exploits, and misconfigurations are other common cyber attack vectors.
  • Recommendations for protection include regular user training, complex password policies, and adoption of multiple layers of security.
  • Behavior analytics, software updates, and secure remote access are emphasized for enhanced security measures.
  • Understanding cyber threats and implementing proactive defense measures are crucial in safeguarding against credential-based attacks.
  • Hackersking provides resources for cybersecurity training and comprehensive cyber defense strategies.

Read Full Article

like

23 Likes

source image

Hackingblogs

1M

read

13

img
dot

Image Credit: Hackingblogs

⚠️ WARNING: TikTok Videos Offering Free Software Are Actually Hiding Deadly Vidar & StealC Malware!

  • Trend Micro discovered a dangerous campaign on TikTok where cybercriminals are tricking users into downloading harmful malware like Vidar and StealC through viral videos.
  • Scam videos offer free software downloads, but actually execute PowerShell commands to download and run malicious programs like StealC or Vidar, changing registry keys for persistence and erasing temporary folders to avoid detection.
  • Cybercriminals are now using AI-generated, deepfake-like videos on platforms like TikTok, YouTube, Instagram to distribute malware, as they are more convincing to users and pose dangers like extracting login info, cookies, and cryptocurrency data.
  • To protect against such threats, users are advised to avoid free software activation tutorials, use trustworthy antivirus programs, monitor account activities, and utilize breach monitoring services for data security.

Read Full Article

like

Like

source image

Securityaffairs

1M

read

63

img
dot

Image Credit: Securityaffairs

Silent Ransom Group targeting law firms, the FBI warns

  • The FBI warns that the Silent Ransom Group, also known as Luna Moth, has been targeting U.S. law firms for 2 years using callback phishing and social engineering tactics.
  • The group gains remote access to systems and steals sensitive data to extort victims. They have previously enabled Ryuk and Conti ransomware attacks through BazarCall campaigns.
  • SRG started posing as IT staff in phone calls since March 2025, tricking employees into granting remote access and exfiltrating data without needing admin privileges.
  • After stealing data, SRG extorts victims with ransom emails and pressures employees into negotiations. They operate a data leak site but do not always follow through on threats to publish the data.

Read Full Article

like

3 Likes

source image

Hackersking

1M

read

118

img
dot

Image Credit: Hackersking

Strategy to Move Users Data & Chats to Google Workspace

  • Assess and plan your migration to Google Workspace by evaluating existing cloud and communication channels and analyzing data to be migrated.
  • Migrate data with all associated features like permissions, version history, comments, timestamps, and links to ensure seamless access and workability.
  • Plan the migration of chat history from platforms like Slack to Google Chat for real-time communication using tools like CloudFuze.
  • Carefully strategize the migration of email systems to Gmail using services like CloudFuze and evaluate data post-migration for accuracy and completeness.

Read Full Article

like

7 Likes

source image

Securityaffairs

1M

read

314

img
dot

Image Credit: Securityaffairs

Leader of Qakbot cybercrime network indicted in U.S. crackdown

  • U.S. authorities indicted Russian national Rustam Gallyamov for leading the Qakbot botnet, which infected over 700,000 computers and facilitated ransomware attacks.
  • Qakbot, also known as QBot, is an info-stealing malware active since 2008, spread via malspam campaigns, and has been used by major ransomware gangs.
  • The U.S. Justice Department filed a civil forfeiture complaint to seize over $24 million in cryptocurrency from Gallyamov as part of a multinational cybercrime crackdown.
  • The FBI performed a sinkholing of the Qakbot botnet, identified over 700,000 infected computers, and seized illicit proceeds worth over $24 million, despite Gallyamov continuing attacks till January 2025.

Read Full Article

like

18 Likes

source image

Hackersking

1M

read

400

img
dot

Image Credit: Hackersking

The Smartest Way to Build Authority and Backlinks in 2025

  • Guest posting is a reliable strategy in digital marketing for boosting online presence, SEO rankings, and brand authority in 2025.
  • Guest posting involves writing and publishing content on another website in exchange for a backlink to your site, providing benefits for both parties.
  • Guest posting still works due to high-quality backlinks, targeted traffic, brand building, and thought leadership opportunities it offers.
  • To make guest posting effective, focus on publishing on high-authority sites, offering unique content, including relevant links, and matching the host blog's tone and audience.

Read Full Article

like

24 Likes

source image

Metro

1M

read

296

img
dot

Image Credit: Metro

The simple tactics of hackers targeting major firms like M&S and Co-op

  • Companies and websites are facing constant cyber attacks, with supermarkets like M&S being targeted recently.
  • Ransomware attacks have caused disruptions for M&S, Co-op, and Harrods; hackers are using clever tactics rather than sophisticated techniques.
  • A hacking collective named Scattered Spider has been linked to the recent cyber attacks.
  • M&S suffered a ransomware attack that encrypted servers, potentially breaching as early as February.
  • Hackers like Scattered Spider use social engineering methods to gain access to systems.
  • Motivations of hackers vary, with money often being a secondary reason; some seek recognition or to sow chaos.
  • Cyber attacks are a constant threat, with hackers exploiting vulnerabilities and old flaws.
  • The perception of increased cyber attacks is due to more companies transparently reporting breaches.
  • Marks & Spencer's open communication about the attack has contributed to the public perception of rising attacks.
  • Cybersecurity experts emphasize the need for vigilance and proactive measures against cyber threats.

Read Full Article

like

17 Likes

source image

Guardian

1M

read

77

img
dot

Image Credit: Guardian

M&S contractor ‘investigating whether it was gateway for cyber-attack’

  • An Indian company operating Marks & Spencer's IT helpdesk is investigating if it was used as a gateway for cybercriminals to access the retailer's systems.
  • M&S confirmed that hackers used 'social engineering' techniques to gain access, with potential costs of up to £300m in profit.
  • Tata Consulting Services (TCS), a contractor for M&S, is conducting an internal inquiry to determine if its employees or systems were linked to the cyber-attack.
  • The Information Commissioner's Office (ICO) may impose fines for any loss of customer and staff data, as M&S faces disruptions in operations with its website not expected to be fully functional until July.

Read Full Article

like

4 Likes

source image

Hackingblogs

1M

read

1k

img
dot

Image Credit: Hackingblogs

Biggest Infostealer malware data breach 2025 EXPOSES Everything: Facebook, Snapchat, Microsoft, Instagram, Google, and Even Your Bank Logins!

  • A massive infostealer malware data breach in 2025 has exposed 184 million usernames and passwords from various platforms like Facebook, Instagram, Microsoft, Snapchat, Google, and others.
  • The breach, discovered by cybersecurity expert Jeremiah Fowler, included direct logins to private accounts and was easily accessible online without encryption or protection.
  • The breached data encompassed credentials for social media platforms, email services, banking websites, government and corporate accounts, among others.
  • Immediate actions include monitoring leaks, updating passwords, raising awareness, and staying vigilant to mitigate the risks posed by this significant data breach.

Read Full Article

like

10 Likes

source image

Securityaffairs

1M

read

22

img
dot

Image Credit: Securityaffairs

Operation RapTor led to the arrest of 270 dark web vendors and buyers

  • Operation RapTor led to the arrest of 270 dark web vendors and buyers across 10 countries.
  • The operation dismantled networks involved in trafficking drugs, weapons, and counterfeit goods.
  • Europol supported the action by sharing intelligence packages with national authorities for targeted investigations.
  • Authorities seized over €184M in cash and crypto, 2+ tonnes of drugs, 180+ firearms, 12,500 counterfeit items, and 4+ tonnes of illegal tobacco, striking a major blow to dark web criminal networks.

Read Full Article

like

1 Like

source image

Securityaffairs

1M

read

223

img
dot

Image Credit: Securityaffairs

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

  • Chinese threat actor UAT-6382 exploited a patched Trimble Cityworks flaw to deploy Cobalt Strike and VShell.
  • The CVE-2025-0994 vulnerability in Trimble Cityworks allowed remote code execution, with a CVSS v4 score of 8.6.
  • UAT-6382 breached U.S. local government networks using this vulnerability since January 2025, deploying Chinese-language web shells and custom malware.
  • Talos researchers identified UAT-6382 utilizing Rust-based loaders named TetraLoader, connecting to specific domains and IPs for malicious activities.

Read Full Article

like

13 Likes

source image

Coinpedia

1M

read

369

img
dot

Image Credit: Coinpedia

Cetus Hack Drains $223M from Sui Network, Binance Steps In to Help

  • A hack on the Sui ecosystem's liquidity provider, Cetus, led to the draining of over $200 million, causing panic and significant price crashes for various memecoins and the Cetus token.
  • Cetus confirmed that approximately $223 million was stolen, with $162 million frozen, and they are working on recovering the remaining funds in collaboration with partners.
  • Binance co-founder, CZ, announced that Binance is actively assisting Sui in this situation, offering support that may include rescue measures, technical assistance, or financial aid through Binance's SAFU fund.
  • The attacker exploited a smart contract flaw by using fake tokens, prompting the protocol to pause the contract temporarily. Criticism was directed at Circle for slow response times in freezing stolen funds, highlighting the urgency of real-time actions in such incidents.

Read Full Article

like

22 Likes

For uninterrupted reading, download the app