Monday, December 12, 2022

Elite Hackers Made Almost $1 Million Last Week, Here’s How

None of the zero-days are sold or redistributed by ZDI, instead, the exploited device vendors are quickly given the details required in order for them to release a patch to fix the issue before full technical information is made public or can be exploited by malicious threat actors.

This is yet another great example of why hacking is not a crime. Not all hackers are criminals, those who partake in criminal activity are, and some may employ hacking as part of this criminality. It's important, however, to appreciate the distinction.

logo
Publisher: Forbes
Date: 2022-12-12
Author: Davey Winder
Twitter: @forbes
Reference: (Read more) Visit Source



Ethical hackers discovered 65,000 software vulnerabilities this year | VentureBeat

Vulnerabilities are everywhere. Every device, application and API presents new entry points for attackers to exploit and gain access to privileged information. However, more and more organizations are turning to ethical hackers to help keep up with potential exploits.

In fact, according to HackerOne's 2022 Hacker-Powered Security Report released today, ethical hackers discovered more than 65,000 software vulnerabilities in 2022, an increase of 21% since 2021.

Publisher: VentureBeat
Date: 2022-12-12T15:29:05 00:00
Author: Tim Keary
Twitter: @venturebeat
Reference: (Read more) Visit Source



North Korean Hackers Use Impersonation to Steal Intel - Infosecurity Magazine

A prolific North Korean state hacking group has gone back to basics in a new attempt to understand Western thinking about the hermit nation, according to Microsoft .

One apparently offered him $300 to review a document about North Korea's nuclear program and asked for recommendations for other possible reviewers.

Publisher: Infosecurity Magazine
Date: 2022-12-12T10:30:00
Author: Phil Muncaster
Twitter: @InfosecurityMag
Reference: (Read more) Visit Source



Hackers copied Mango Markets attacker's methods to exploit Lodestar — CertiK

Blockchain security company CertiK has shared a post-mortem analysis of the $5.8 million Lodestar Finance exploit that occurred on Dec. 10:

5. The hacker burned a little over 3 million in GLP, their profit on this exploit was the stolen funds on Lodestar - minus the GLP they burned.

6. 2.8 Million of the GLP is recoverable, which is worth about $2.4 million. We are going to reach out to the hacker and...

logo
Publisher: Cointelegraph
Twitter: @cointelegraph
Reference: (Read more) Visit Source



When Companies Compensate the Hackers, We All Foot the Bill

Companies are always absorbing costs that are seen as par for the course of budget planning: maintenance, upgrades, office supplies, wastage, shrinkage, etc. These costs ratchet up the price of a company's products and are then passed on to the consumer.

If a company estimates the recovery costs from a ransomware attack to exceed the requested payment from the hacker, then it feels like a no-brainer — they're better off just cutting their losses and giving in to the cybercriminal's demands.

Publisher: Dark Reading
Date: 2022-12-12T15:00:00.000Z
Author: https www darkreading com author bat el azerad
Reference: (Read more) Visit Source



Estonia Builds Ukraine Military Cyber Facility to Fend Off Russian Hackers

e-Governance Academy (eGA) and CybExer Technologies collaborated on the project as part of the European Union's support for Ukraine.

According to the eGA, the consortium has been working closely with the Ukrainian military for more than eight months to help improve its cybersecurity skills.

logo
Publisher: The Defense Post
Date: 2022-12-12T10:35:39 00:00
Author: Joe Saballa
Twitter: @defensepost
Reference: (Read more) Visit Source



Clop ransomware uses TrueBot malware for access to networks

The Silence group is known for its big heists against financial institutions, and has begun to shift from phishing as an initial compromise vector.

The threat actor is also using a new custom data exfiltration tool called Teleport. Analysis of Silence's attacks over the past months revealed that the gang delivered Clop ransomware typically deployed by TA505 hackers , which are associated with the FIN11 group.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Backups For Your Law Firm - Recovering from Human Error, Disasters, Hackers, and More - Legal Talk ...

John W. Simek is vice president of the digital forensics, managed information technology and cybersecurity firm Sensei...

JoAnn Hathaway is a practice management advisor for the State Bar of Michigan. She previously worked as...

Molly Ranns is program director for the Lawyers and Judges Assistance Program at the State Bar of...

logo
Publisher: Legal Talk Network
Twitter: @legaltalknet
Reference: (Read more) Visit Source



Zombinder on Dark Web Lets Hackers Add Malware to Legit Apps

Dubbed Zombinder, this platform was detected while investigating a campaign in which scammers were distributing multiple kinds of Windows and Android malware , including Android banking malware like Ermac, Laplas "clipper," Erbium, and the Aurora stealer, etc.

This comes just days after a new dark web marketplace called InTheBox surfaced online, serving smartphone malware developers and operators.

logo
Publisher: HackRead | Latest Cyber Crime - InfoSec- Tech - Hacking News
Date: 2022-12-09T20:27:00 00:00
Reference: (Read more) Visit Source



Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers

The discovery, reported by Google Threat Analysis Group researchers Benoît Sevens and Clément Lecigne, is the latest set of attacks perpetrated by ScarCruft , which is also called APT37, InkySquid, Reaper, and Ricochet Chollima.

Another key tool in its arsenal is RokRat , a Windows-based remote access trojan that comes with a wide range of functions that allow it to capture screenshots, log keystrokes, and even harvest Bluetooth device information.

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source







System Unknown NFT Collection


#NFT #ETH #nftgiveaways #nftcommunity #Giveaways #NFTPromotion #ART

https://opensea.io/collection/systemunknown

Check out the System Unknown artwork. Click here.



Earth is nice. We want it.





No comments:

Post a Comment