Thursday, July 16, 2020

Twitter hacking: Here’s what may have happened | Fortune

Publisher: Fortune
Reference: (Read more) Visit Source



While you're here, how about this:

Hackers Take Over Apple, Uber, Prominent Crypto Twitter Accounts in Simultaneous Attack - CoinDesk

Hackers pumping a crypto giveaway scam appear to have compromised the Twitter accounts of leading exchanges, individuals and at least one news organization.

Publisher: CoinDesk
Date: 2020-07-15T19:59:34 00:00
Twitter: @coindesk
Reference: (Read more) Visit Source



A hacker is selling details of 142 million MGM hotel guests on the dark web | ZDNet

The MGM Resorts 2019 data breach is much larger than initially reported, and is now believed to have impacted more than 142 million hotel guests, and not just the 10.6 million that ZDNet initially reported back in February 2020 .

The new finding came to light over the weekend after a hacker put up for sale the hotel's data in an ad published on a dark web cybercrime marketplace.

According to the ad, the hacker is selling the details of 142,479,937 MGM hotel guests for a price just over $2,900.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



Breached Data Indexer ‘Data Viper’ Hacked — Krebs on Security

Data Viper is the brainchild of Vinny Troia , a security researcher who runs a cyber threat intelligence company called Night Lion Security . Since its inception in 2018, Data Viper has billed itself as a “threat intelligence platform designed to provide organizations, investigators and law enforcement with access to the largest collection of private hacker channels, pastes, forums and breached databases on the market.”

Many private companies sell access to such information to vetted clients — mainly law enforcement officials and anti-fraud experts working in security roles at major companies that can foot the bill for these often pricey services.

Twitter: @briankrebs
Reference: (Read more) Visit Source



This may worth something:

Hackers circulating 15 billion stolen logins on the dark web - Business Insider

Accounts seen as especially valuable, like domain administrators for a small business or local government, are typically auctioned off on the dark web. Buyers will bid an average of $3,139 and up to $140,000 for such logins, according to the report. 

Publisher: Business Insider
Date: 2020-07-13
Author: Aaron Holmes
Twitter: @sai
Reference: (Read more) Visit Source



Riot Games Encrypt Message in Valorant Anti-Cheat to Recruit Hackers - EssentiallySports

Games from Riot namely, Valorant, League of Legends, etc. are protected against cheats and tampering of files by a system within which there is a file called packman. Here is the interesting bit: devs hid a message in the packman file showing their desire to recruit hackers and cheaters who came across this while trying to tamper with the files.

Valorant devs have hidden this message (or rather job offer) in a file called Stubs.dll. This file is a part of the game’s anti-tamper system. There is a group of hackers who reverse engineer games and find out its vulnerabilities to create cheats for the game and sell it. They were one of the first to come across this message back in April, along with some online players. They posted this on a popular forum for cheaters. The message reads as follows:

logo
Publisher: EssentiallySports
Date: 2020-07-15T20:42:57 00:00
Reference: (Read more) Visit Source



Do Hackers Really Battle in Real Time? 

Everyone knows that hacker-attack scene from NCIS . Working in their dimly lit forensics lab, Abby Sciuto (Pauley Perrette) and Timothy McGee (Sean Murray) have to fend off a cybercriminal, hell-bent on stealing information about their investigation.

* * *

Amidst a torrent of indecipherable technobabble ( He's burned through the firewall! This is DOD Level 9 encryption! ), the pair begin to fight back. Eventually, they end up typing simultaneously on the same keyboard. It is—for lack of a better term—ludicrous.

Publisher: How-To Geek
Date: Do Hackers Really Battle in Real Time
Twitter: @howtogeek
Reference: (Read more) Visit Source



Hacker breaches security firm in act of revenge | ZDNet

Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.

The hacker says the stolen data includes more than 8,200 databases containing the information of billions of users that leaked from other companies during past security breaches.

A data leak monitoring service is a common type of service offered by cyber-security firms. Security companies scan the dark web, hacking forums, paste sites, and other locations to collect information about companies that had their data leaked online.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



No comments:

Post a Comment