TechRepublic speaks to HackerOne about how ethical hackers are helping to shrink the broader attack surface of cyber criminals.
Modern cybersecurity approaches have evolved as cyberattacks proliferate and find new sophisticated ways to breach into an organization. However, despite the technological advances, the number of cyberattacks continues to be at an all-time high.
China-linked hackers, and chromosome variations | MIT Technology Review
Who are they? The hackers, known as RedAlpha, have taken aim at organizations including Amnesty International, the International Federation for Human Rights, Radio Free Asia, the Mercator Institute for China Studies, and other think tanks and government and humanitarian groups around the world.
Hackers Attack UK Water Supplier, Sends Ransom Demand to the Wrong Company
Hackers infiltrated the corporate-side of a utility that supplies water to about 1.3 million people in the United Kingdom. However, the apparent data breach may not have been the one the cyber-criminals were aiming for.
Thames Water services 15 million people, more than ten times the scale of South Staffordshire. So, although any attack on a public utility is clearly bad, there's a big difference between the scale of what ClOP claimed and what utilities copped to.
Bloomberg - Are you a robot?
Microsoft Warns About Phishing Attacks by Russia-linked Hackers
Microsoft on Monday revealed it took steps to disrupt phishing operations undertaken by a "highly persistent threat actor" whose objectives align closely with Russian state interests.
The company is tracking the espionage-oriented activity cluster under its chemical element-themed moniker SEABORGIUM , which it said overlaps with a hacking group also known as Callisto , COLDRIVER , and TA446.
AI Can Help Protect HR Data from Hackers
The sensitive nature of HR data has always made it a rich target for bad actors. The prominent ransomware attack on industry vendor UKG represents just one example of cybercriminals' increased attempts to breach Social Security numbers, bank account information, compensation data and more.
North Korea is the new realm of crypto hackers - The Cryptonomist
NFT Show Europe maps out the metaverse by connecting blockchain innovators with immersive digital artists
World of Web3 (WOW) returns for its 3rd global eclectic edition Summit in Europe this November 1 - 3 2022
LaLiga Names Divi Official Crypto Wallet for MENA, SEA, & China, in World's First for a Football League
Hackers Could Take Over Your Mac via Zoom | Tech.co
Zoom has just patched a macOS bug that allowed hackers to take control of a given device's operating system through the platform, according to a security researcher.
However, users who have not updated their software could still be at risk of having their macs infiltrated.
Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware
Russian state-sponsored actors are continuing to strike Ukrainian entities with information-stealing malware as part of what's suspected to be an espionage operation.
The threat actor, active since at least 2013, is known for explicitly singling out public and private entities in Ukraine. The attacks have since ratcheted up in the wake of Russia's military invasion in late 2022.
Army of the Alien Monkeys
Earth is nice. We want it.
We welcome your submission to us.
No comments:
Post a Comment