menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Securityaffairs

1M

read

352

img
dot

Image Credit: Securityaffairs

France’s second-largest telecoms provider Free suffered a cyber attack

  • French telecoms provider Free discloses a cyber attack where threat actors had access to customer personal information.
  • The attack targeted a management tool, leading to unauthorized access to some subscriber accounts.
  • No passwords, bank cards, or communication content were compromised in the attack.
  • Free has taken immediate measures to mitigate the security breach and has filed a criminal complaint.

Read Full Article

like

21 Likes

source image

Hackersking

1M

read

265

img
dot

Image Credit: Hackersking

Local Area Network (LAN) TO Wide Area Network (WAN): Expose Your Local Host To Internet

  • There is a tool called 'Host' that makes it easy to expose your local host to the Internet while testing new things on your Linux system.
  • The tool offers 4 different tunneling options: Localhost (127.0.0.1), Ngrok, Cloudflared, and LocalXpose.
  • To set up and use the tool, you need to clone the repository and run the 'host.sh' script.
  • The tool is designed for beginners and eliminates the need for remembering or typing lengthy commands.

Read Full Article

like

15 Likes

source image

Securityaffairs

1M

read

32

img
dot

Image Credit: Securityaffairs

A crime ring compromised Italian state databases reselling stolen info

  • Italian police have arrested four individuals and are investigating dozens, including Leonardo Maria Del Vecchio, for unauthorized access to state databases.
  • Charges include criminal conspiracy, illegal interception, falsification of electronic communications, disclosure of confidential information, aiding and abetting, and extortion.
  • The criminal ring allegedly collected a large amount of sensitive data and offered it to customers for various purposes, potentially including spying and blackmail.
  • Investigators suspect that foreign intelligence agencies may have also accessed the stolen data.

Read Full Article

like

1 Like

source image

Kaspersky

1M

read

311

img
dot

Image Credit: Kaspersky

How to track Kia car owners online | Kaspersky official blog

  • Security researchers discovered a vulnerability in Kia's web portal that allowed cars to be hacked remotely and their owners tracked.
  • The vulnerability allowed anyone to register as a car dealer with access to owner's data using just the vehicle's VIN number.
  • An experimental app was developed to take control of any Kia vehicle by entering its license plate number, enabling functions like location tracking, door locking/unlocking, engine start/stop, and horn honking.
  • The researchers responsibly disclosed the vulnerability to Kia and published their findings after it was fixed, but anticipate discovering more vulnerabilities in the future.

Read Full Article

like

18 Likes

source image

Securityaffairs

1M

read

9

img
dot

Image Credit: Securityaffairs

Third-Party Identities: The Weakest Link in Your Cybersecurity Supply Chain

  • Third party supply chain is the weakest link which adds third-party risk affecting each partner's security, making identity and access management more challenging
  • The lack of visibility in identities logging in daily coupled with unsafe credentials of nearly two to one non-employees could add detrimental risk to the organization
  • Identity and Access Management (IAM) is a solution to solve this problem, which can manage upstream vendors and third-party risks securely without additional technical difficulties
  • Companies engaging in B2B or B2B2X activities require IAM solutions to cover compliance and to maintain the trust of their clients
  • With Zero Trust guiding cybersecurity, IAM is a foundational pillar in dealing with third-party risk, eliminating stolen credentials as the prime point of compromise, especially when nearly 9 out of 10 breaches originate from stolen credentials
  • IAM solution can be the perfect solution to not only safeguard against inherent third-party risks but also help organizations scale, integrate with other systems, and overcome challenges in digitization by providing policy configuration, Multi-factor authentication (MFA), Single sign-on (SSO), orchestrate user journey flows and more
  • Implementing IAM sooner rather than later is a big win - it streamlines processes such as onboarding and login, establishing a curated trust and delineate who has access to valuable information
  • Security of our digital presence is more critical than ever. Protect your organization by Implementing Identity and Access Management

Read Full Article

like

Like

source image

Silicon

1M

read

417

img
dot

Image Credit: Silicon

China Hackers Targeted Harris, Trump, Vance Phones

  • China-affiliated hackers infiltrated Verizon's telephone network and targeted prominent US political figures, including Kamala Harris, Donald Trump, and JD Vance.
  • The hacks are part of an intelligence-gathering campaign by a Chinese government-affiliated hacking group known as "Salt Typhoon".
  • The same group also attacked US broadband providers, potentially accessing information from systems used for court-authorized wiretapping requests.
  • The FBI and the Cybersecurity and Infrastructure Security Agency confirmed that the hack was carried out by actors affiliated with China.

Read Full Article

like

25 Likes

source image

Tech Story

1M

read

119

img
dot

How to See Upcoming Birthdays on Snapchat

  • Snapchat's "Birthdays" feature allows users to keep track of upcoming birthdays and celebrate them within the app.
  • To view a list of upcoming birthdays on Snapchat:
  • 1. Open a conversation and tap the user's name at the top.
  • 2. Tap the friend's birthdate under their Bitmoji symbol.
  • 3. A list of forthcoming birthdays will be visible.
  • Make sure the Snapchat app is updated to access the Birthdays feature and check friends' profiles for individual birthdays.
  • Snapchat respects user privacy, so only friends who have chosen to share their birthdays will be visible.
  • Users can use additional features like creating reminders, sending birthday photos, and utilizing birthday-themed filters and stickers.
  • Remember to send personalized photos, share stories, and use Bitmoji stickers to celebrate friends' birthdays on Snapchat.

Read Full Article

like

7 Likes

source image

Securityaffairs

1M

read

385

img
dot

Image Credit: Securityaffairs

Black Basta affiliates used Microsoft Teams in recent attacks

  • ReliaQuest researchers observed Black Basta affiliates relying on Microsoft Teams to gain initial access to target networks.
  • Black Basta ransomware affiliates switched to Microsoft Teams, posing as IT support to deceive employees into granting access.
  • Threat actors flood employee inboxes with emails, then impersonate IT support on Microsoft Teams to offer help.
  • Attackers send QR codes in chats as part of Quishing attempts.

Read Full Article

like

23 Likes

source image

Hackersking

1M

read

426

img
dot

Image Credit: Hackersking

Social Analyzer - API, CLI, and Web App for analyzing & finding Online Identity

  • Social Analyzer is an API, CLI, and Web App for analyzing and finding a person's profile across +1000 social media and websites.
  • The tool includes different analysis and detection modules, allowing users to choose which modules to use during the investigation process.
  • It utilizes a rating mechanism to provide a rate value based on detection techniques, helping to identify suspicious or malicious activities online.
  • Social Analyzer can be set up as a Web App or CLI, offering a wide range of features such as string and name analysis, multi-profile search, metadata extraction, custom search queries, and more.

Read Full Article

like

25 Likes

source image

Securityaffairs

2M

read

449

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 495 by Pierluigi Paganini – INTERNATIONAL EDITION

  • Chinese cyber spies targeted phones used by Trump and Vance
  • Irish Data Protection Commission fined LinkedIn €310M for GDPR infringement
  • Change Healthcare data breach impacted over 100 million people
  • OnePoint Patient Care data breach impacted 795916 individuals

Read Full Article

like

27 Likes

source image

Hackersking

2M

read

50

img
dot

Image Credit: Hackersking

Get Existing Accounts From Email OSINT Tool Eyes

  • Eyes is an open-source intelligence (OSINT) tool used to find existing accounts based on an email address.
  • It offers features like full async and asynchronous scraping, as well as modules for facial recognition.
  • To use Eyes, you can clone the GitHub repository, install the requirements, and execute the tool with the target email.
  • The tool provides information on the target email using various modules and services.

Read Full Article

like

3 Likes

source image

Medium

2M

read

41

img
dot

Image Credit: Medium

Artificial Intelligence in Cybersecurity: Revolutionizing Threat Detection and Defense

  • AI-driven cybersecurity tools can process vast amounts of data in real-time, identify unusual patterns, and respond to threats faster than human analysts.
  • AI offers real-time threat detection, enhanced response times, proactive threat prediction, and automated routine tasks.
  • Challenges of AI in cybersecurity include a high rate of false positives, data privacy and security concerns, dependency on quality data, and potential for adversarial attacks.
  • Practical applications of AI in cybersecurity include fraud detection, intrusion detection and prevention, malware analysis and prevention, and user behavior analytics.

Read Full Article

like

2 Likes

source image

Medium

2M

read

188

img
dot

Image Credit: Medium

My first experience hacking websites

  • Browsers come equipped with developer tools for viewing HTML, CSS, and executing commands.
  • HackThisSite and XSS Game are websites that teach hacking techniques and website manipulation.
  • These platforms are helpful for beginners in learning cybersecurity and protecting their websites.
  • Understanding vulnerabilities is essential for safeguarding personal and company data.

Read Full Article

like

11 Likes

source image

Securityaffairs

2M

read

96

img
dot

Image Credit: Securityaffairs

Chinese cyber spies targeted phones used by Trump and Vance

  • China-linked threat actors targeted the phone communications of Donald Trump and vice presidential nominee JD Vance.
  • US intelligence is investigating the claims to determine what communications were eavesdropped by the cyberspies.
  • The information on phones used by the two politicians is a gold mine for foreign intelligence agencies.
  • Chinese cyber spies also targeted people affiliated with the Harris-Walz campaign and senior Biden administration officials.

Read Full Article

like

5 Likes

source image

Hackersking

2M

read

124

img
dot

Image Credit: Hackersking

WHEN IS CYBERSECURITY IS WEEK

  • Cybersecurity Week is observed annually in the first week of October to raise awareness about cybersecurity challenges.
  • The week includes workshops, webinars, social media campaigns, and community events to educate and engage individuals in cybersecurity.
  • Best practices to adopt for better cybersecurity include using strong passwords, enabling two-factor authentication, staying informed, and backing up data.
  • Organizations play a crucial role in fostering a culture of security and promoting cyber hygiene during Cybersecurity Week and beyond.

Read Full Article

like

7 Likes

For uninterrupted reading, download the app