menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Securityaffairs

6d

read

263

img
dot

Image Credit: Securityaffairs

Coinbase disclosed a data breach after an extortion attempt

  • Coinbase disclosed a data breach after rogue contractors stole customer data and demanded a $20M ransom.
  • The breach, affecting under 1% of users, was reported to the SEC after a ransom demand was received on May 11, 2025.
  • The unauthorized access was detected in previous months, leading to termination of involved personnel and implementation of heightened fraud-monitoring measures.
  • Compromised data includes contact details, partial SSNs and bank info, ID images, account history, and limited internal documents but did not expose passwords, private keys, or customer funds.

Read Full Article

like

15 Likes

source image

Bitcoinist

6d

read

297

img
dot

Image Credit: Bitcoinist

What The?! $400 Million Gone! Insider Phishing Attack Shakes Coinbase

  • Coinbase faced a threat from outside attackers attempting to extort $20 million in Bitcoin, resulting in personal account details being leaked by paid off support agents.
  • Less than 1% of Coinbase's monthly active traders had some of their data exposed, as a handful of customer-support contractors accessed internal tools to extract names, email addresses, and limited transaction records.
  • Coinbase refused to pay the hackers' demand and instead announced a $20 million bounty to track down those responsible, and plans to set aside $180 million to $400 million for customer reimbursements for phishing scam losses.
  • Phishing losses for Coinbase users are rising, estimated at over $300 million annually, prompting Coinbase to strengthen defenses by improving data controls, relocating support work, enhancing staff checks, and upgrading fraud-monitoring tools.

Read Full Article

like

17 Likes

source image

Siliconangle

6d

read

86

img
dot

Image Credit: Siliconangle

Coinbase suffers data breach, exposing customer information to hackers

  • Coinbase Global Inc. disclosed a data breach where cybercriminals bribed offshore customer service support agents to steal customer data.
  • No passwords, private keys, or funds were exposed, but personal customer information such as names, addresses, phone numbers, email addresses, and limited corporate data were stolen.
  • Attackers did not access login credentials or private keys to move or access customer funds.
  • Coinbase refused a $20 million payoff demanded by the attackers and instead turned it into a $20 million bounty for information leading to the arrest of the criminals; estimated costs for the company range between $180 million and $400 million for reimbursement and expenses.

Read Full Article

like

5 Likes

source image

Securelist

6d

read

297

img
dot

Image Credit: Securelist

Threat landscape for industrial automation systems in Q1 2025

  • The percentage of ICS computers on which malicious objects were blocked remained stable in Q1 2025, at 21.9%.
  • Quarterly figures show a decreasing trend year over year, with a decrease of 2.5 pp compared to Q1 2024.
  • Biometrics sector saw an increase in malicious object blocks, the only OT infrastructure type where this occurred.
  • Threat levels vary regionally, with Northern Europe at 10.7% and Africa at 29.6% affected ICS computers.
  • Denylisted internet resources blocked and email threats decreased in Q1 2025, hitting a low since 2022.
  • Primary threats from the internet include denylisted resources, malicious scripts, and phishing pages.
  • Malicious scripts, phishing pages, and documents showed an increase in blocks in Q1 2025.
  • AutoCAD malware saw the lowest percentage of blocks among ICS computers and continued to decrease.
  • Web miners and malicious documents blocks increased notably in Q1 2025.
  • The percentage of ICS computers on which worms, viruses, and cad malware were blocked decreased in Q1 2025.

Read Full Article

like

17 Likes

source image

Securityaffairs

6d

read

136

img
dot

Image Credit: Securityaffairs

U.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalog

  • U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Fortinet vulnerability to its Known Exploited Vulnerabilities catalog, impacting several Fortinet products.
  • A critical remote code execution zero-day vulnerability, CVE-2025-32756, in FortiVoice systems was exploited by threat actors to execute arbitrary code.
  • Attackers scanned networks, erased crash logs, enabled debugging, and captured login credentials after exploiting the vulnerability.
  • CISA ordered federal agencies to address the identified vulnerability by June 4, 2025, in line with cybersecurity directives to protect networks and infrastructure from potential attacks.

Read Full Article

like

8 Likes

source image

Hackersking

6d

read

239

img
dot

Image Credit: Hackersking

Transforming Design with qoruv.com Architect App: Building Smarter and Faster

  • The qoruv.com Architect App is revolutionizing the architecture and design industry by offering innovative features for professionals to efficiently execute tasks and transform ideas into reality.
  • This platform provides a user-friendly interface with design tools, collaborative work environments, and management features, making it unique and beneficial for engineers, architects, and design professionals.
  • Key characteristics of the qoruv.com Architect App include cloud-based access, 3D modeling tools, revision control, synchronous collaboration, BIM integration, and AI-assisted design suggestions.
  • The app enhances workflow efficiency by streamlining processes, offering intuitive interfaces for quick generation of tech drawings and 3D models, and catering to various architectural needs and project sizes.
  • Qoruv.com's AI technology improves design sustainability, compliance, and aesthetics while ensuring adherence to industry best practices and regulations.
  • With secure cloud storage, the app prioritizes data protection with encryption, automated backups, and controlled sharing, allowing authorized users worldwide to access collaborative features.
  • Real-world applications include improved client presentations through vivid 3D visualizations, enhanced client understanding with VR walkthroughs, and streamlined internal design reviews for multinational companies and educational institutions.
  • Although feature-rich, the qoruv.com Architect App offers a user-friendly learning curve with video guides, community support, and training resources for professionals with varying levels of experience.
  • With its adaptability and focus on emerging technological demands in the construction industry, the qoruv.com app is poised to lead architectural tech innovation with its AI-driven instructions, real-time collaboration, and cloud efficiencies.
  • In conclusion, qoruv.com Architect App is more than just software; it is an advanced architectural and design ecosystem that facilitates smarter, quicker, and more efficient solutions, giving professionals a competitive advantage in a demanding industry.

Read Full Article

like

14 Likes

source image

Securityaffairs

6d

read

368

img
dot

Image Credit: Securityaffairs

Kosovo authorities extradited admin of the cybercrime marketplace BlackDB.cc

  • Kosovo citizen Liridon Masurica (33) extradited to the US for running cybercrime marketplace BlackDB.cc and facing related charges.
  • BlackDB.cc, an online criminal marketplace active since 2018, offered compromised credentials and PII for sale.
  • Masurica charged in the US with six fraud-related counts, faces up to 55 years in prison for conspiracy and unauthorized access device usage.
  • The US Department of Justice seized another cybercrime marketplace Rydox, arresting three Kosovo nationals, including administrators, for facilitating sales of stolen personal data and fraud tools.

Read Full Article

like

22 Likes

source image

Idownloadblog

6d

read

178

img
dot

Image Credit: Idownloadblog

Security researcher shares PoC for CVE-2023-41992 local privilege escalation bug

  • Apple patched a security vulnerability (CVE-2023-41992) in iOS & iPadOS 16.7 discovered by Bill Marczak, which allowed local privilege escalation.
  • iOS security researcher @karzan_0x455 shared a proof of concept for the CVE-2023-41992 vulnerability showing how it can be exploited.
  • The proof of concept demonstrates the local privilege escalation bug, providing insights for potential hackers to create exploits, jailbreaks, or TrollStore installation methods.
  • While the bug may not lead to immediate jailbreaks due to additional security bypass requirements, it could be valuable for future projects like alternative installation methods up to iOS & iPadOS 17.0.

Read Full Article

like

10 Likes

source image

Hackernoon

7d

read

49

img
dot

Image Credit: Hackernoon

Anonymous vs “ICE Air:” GlobaIX Needs A Security Fix

  • Hacker group 'Anonymous' targeted GlobalX, also known as 'ICE Air,' and leaked sensitive deportation flight files.
  • The attack on GlobalX involved breaching the developer's token and obtaining security keys for the company's AWS cloud storage.
  • Sensitive data obtained by 'Anonymous' included detailed passenger lists for GlobalX's deportation flights, confirming the authenticity of leaked information.
  • GlobalX activated incident response protocols and cybersecurity experts to investigate and contain the breach, expecting no material effect on the company's financial condition or operations.

Read Full Article

like

2 Likes

source image

Securityaffairs

7d

read

253

img
dot

Image Credit: Securityaffairs

U.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

  • U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog.
  • CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025-32706, and CVE-2025-32709 are the recently added vulnerabilities with their respective descriptions and severity scores.
  • Microsoft addressed these flaws with the Patch Tuesday Security updates for May 2025 and confirmed their exploitation in the wild.
  • CISA has issued a directive requiring federal agencies to address the vulnerabilities by June 3rd, 2025, and experts recommend private organizations to review and fix these vulnerabilities.

Read Full Article

like

15 Likes

source image

Guardian

7d

read

99

img
dot

Image Credit: Guardian

‘Aggressive’ hackers of UK retailers are now targeting US stores, says Google

  • Hackers responsible for disrupting UK retailers are now targeting similar companies in the United States, according to Google.
  • The hackers, linked with the group 'Scattered Spider', are known for their aggression and ability to circumvent security programs.
  • M&S, a prominent UK retailer, faced a disruptive hack by the Scattered Spider group, affecting its online operations.
  • Recently, M&S announced that some customer data was accessed, including names, addresses, and order histories, but not payment or card details.

Read Full Article

like

5 Likes

source image

Hackers-Arise

7d

read

265

img
dot

Image Credit: Hackers-Arise

Hacking Artificial Intelligence (AI) Large Language Models (LLMs)

  • Large Language Models (LLMs) like ChatGPT, Claude, and Llama have opened up new attack surfaces despite offering tremendous capabilities.
  • Techniques like the Context Ignoring Attack exploit the limitations in how LLMs process information to potentially bypass safeguards.
  • Prompt Leaking involves trying to extract system prompts to understand model limitations and create targeted attacks.
  • Role Play Attacks leverage the creative scenarios of LLMs to bypass safety measures by engaging the model in unethical roles.
  • Prefix Injection manipulates model responses by adding specific text at the beginning of queries, influencing the output.
  • Refusal Suppression attacks aim to stop LLMs from declining harmful queries by instructing them to avoid refusal statements.
  • Sophisticated attackers combine techniques like refusal suppression and context ignoring for more successful attacks.
  • Understanding vulnerabilities in LLMs is crucial as they become more integrated, leading to an escalating battle between exploiters and defenders.

Read Full Article

like

16 Likes

source image

Massivelyop

7d

read

20

img
dot

Account data of 89M Steam users is reportedly up for sale on the dark web

  • Account data of 89 million Steam users is reportedly up for sale on the dark web, putting 70% of the platform's userbase at risk.
  • The data breach was highlighted by a Twitter user referencing a LinkedIn post from cyber threat intelligence firm Underdark.ai.
  • A user going by the name Machine1337 claimed to have the database of Steam account details and is selling it for $5,000 on a dark web forum, with included real-time 2FA SMS logs routed via Twilio.
  • While Steam representative mentioned they do not use Twilio, users are advised to change passwords, enable Steam Guard 2FA, and stay vigilant against phishing attempts as a precautionary measure.

Read Full Article

like

1 Like

source image

TheNewsCrypto

7d

read

366

img
dot

Curve Finance Shifts to New Domain After DNS Hijack Incident

  • Curve Finance has shifted its official web domain from Curve.fi to Curve.finance due to a DNS hijack incident that opened the way to a phishing attack.
  • The platform confirmed that none of its password protections or 2FA systems were breached during the incident, ensuring the safety of funds and internal systems.
  • The decision to change the domain was influenced by prolonged downtime and better support from .finance domain registrars, highlighting improved responsiveness and trust in managing the domains.
  • The incident is still under investigation, and the team is actively working to find out how the breach occurred, with a promise to provide timely updates as more information becomes available.

Read Full Article

like

22 Likes

source image

Securityaffairs

7d

read

341

img
dot

Image Credit: Securityaffairs

Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days

  • Microsoft Patch Tuesday security updates for May 2025 addressed 75 security flaws, including five zero-day vulnerabilities.
  • Of the vulnerabilities fixed, 12 are rated Critical and the rest are rated Important in severity.
  • Microsoft confirmed that five zero-day vulnerabilities were actively exploited in the wild, including issues related to Scripting Engine Memory Corruption and Elevation of Privilege in various Windows components.
  • Microsoft urged users to apply the security updates to protect their systems from potential cyber attacks.

Read Full Article

like

20 Likes

For uninterrupted reading, download the app