Tuesday, September 20, 2022

Meet Lapsus$, the alleged hackers behind the Uber breach

The data-extortion group outed earlier this year as a group of teenagers seems to be making a comeback.

The big picture: Lapsus$ has been relatively quiet since receiving law enforcement attention in March.

Catch up quick: Before prosecutors deduced that teenagers are behind Lapsus$, many researchers believed they were actually an up-and-coming Brazilian ransomware gang.

logo
Publisher: Axios
Date: 2022-09-20T16:44:10.458000Z
Author: Sam Sabin
Twitter: @axios
Reference: (Read more) Visit Source



Learn to recognize hackers, be part of cybersecurity solution

They are just assuming you would not want it revealed and are preying on that fact. Hackers conduct this and similar kinds of online extortion every day.

Luckily by calling us asking for help attaching pics we were able to advise her she was about to be scammed and to stop communicating with the hackers.

Publisher: _____
Author: Blake Dowling
Reference: (Read more) Visit Source



Russian Sandworm Hackers Impersonate Ukrainian Telecoms to Distribute Malware

Recorded Future said it discovered new infrastructure belonging to UAC-0113 that mimics operators like Datagroup and EuroTransTelecom to deliver payloads such as Colibri loader and Warzone RAT .

Sandworm is a destructive Russian threat group that's best known for carrying out attacks such as the 2015 and 2016 targeting of Ukrainian electrical grid and 2017's NotPetya attacks. It's confirmed to be Unit 74455 of Russia's GRU military intelligence agency.

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source



Cryptocurrency company Wintermute says hackers stole $160 million - The Record by Recorded Future

Cryptocurrency company Wintermute has "been hacked for about $160 million" according to its founder and chief executive Evgeny Gaevoy.

It is the latest multimillion-dollar cyber heist within the decentralized finance (DeFi) space and follows $625 million being stolen from Ronin Network in March in a hack the U.S. later blamed on North Korea .

logo
Publisher: The Record by Recorded Future
Date: 2022-09-20T12:28:19 00:00
Twitter: @therecord_media
Reference: (Read more) Visit Source



Hackers take over CoinDCX Twitter account, promote fake XRP ads

On the same day, an Elon Musk giveaway scam plagued an official YouTube account owned by the government of South Korea. The account was compromised and renamed SpaceX Invest as it posted fake videos of Musk talking about crypto.

logo
Publisher: Cointelegraph
Twitter: @cointelegraph
Reference: (Read more) Visit Source



Cybersecurity powerhouse Israel remains open to hackers - Al-Monitor: Independent, trusted ...

In recent years Israel has prided itself on becoming a cyberdefense superpower, including branding the southern city of Beersheba "the cyber capital of Israel." But even so, outside hackers continue to take aim at Israeli institutions and organizations.

On Aug. 31, for instance, a computer intrusion occurred against the websites of the Haifa, Eilat, and Jaffa ports and the tourism site of Old Acre. Some reports claimed that it was Iranian hackers, but the Iraqi hacker group Al-tahrea claimed responsibility.

Publisher: Al-Monitor: Independent, trusted coverage of the Middle East
Twitter: @AlMonitor
Reference: (Read more) Visit Source



MFA Fatigue: Hackers' new favorite tactic in high-profile breaches

Hackers are more frequently using social engineering attacks to gain access to corporate credentials and breach large networks. One component of these attacks that is becoming more popular with the rise of multi-factor authentication is a technique called MFA Fatigue.

When breaching corporate networks, hackers commonly use stolen employee login credentials to access VPNs and the internal network.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



ProHactive: The Top Place to Hire Ethical Hackers

At Prohactive platform, they understand that there are different reasons why people may want to hire a certified hacker.

In addition, they also offer 24/7 customer support, so users can always get help when they need it. The software has secured payments so users can feel confident their information is safe. And finally, the software offers tracking so users can see how their tasks are progressing.

Publisher: GlobeNewswire News Room
Date: 9/19/2022 10:52:21 PM
Author: ProHactive
Twitter: @globenewswire
Reference: (Read more) Visit Source



Hackers Tackle Water Crisis at Europe's Biggest Hackathon | Business Wire

Having sponsored the event for the last two years, Xylem continues to challenge teams to solve global water issues with a unique, digital approach.

With water scarcity affecting billions of people globally each year, the WatApp team created an app that would improve water consumption habits by suggesting more sustainable choices using educational gaming features.

Date: 2022-09-20
Twitter: @businesswire
Reference: (Read more) Visit Source






https://sypuber.page.link/reddcct

REDACTED ID. Click here.





No comments:

Post a Comment