Friday, December 16, 2022

Three principles ethical hackers can adopt as a code of conduct | SC Media

As cyberattacks have increased in frequency and sophistication, businesses have been forced to take a more proactive approach to countering cybersecurity threats.

In response, the ethical hacking industry has witnessed a 350% growth so far, with the industry set to grow at 21% per year . Right now, ethical hackers are sought out more than ever to work against cybercriminals to beat them at their own game.

logo
Publisher: SC Media
Date: 2022-12-16T06:00:00.000-05:00
Author: Haris Pylarinos
Twitter: @SCMagazine
Reference: (Read more) Visit Source



Should crypto projects ever negotiate with hackers? Probably – Cointelegraph Magazine

"A highly profitable trading strategy" was how hacker Avraham Eisenberg described his involvement in the Mango Markets exploit that occurred on Oct. 11.

Desperate for the return of funds, developers and users alike voted for a proposal that would allow Eisenberg and co. to keep $47 million of the $117 million exploited in the attack. Astonishingly, Eisenberg was able to vote for his own proposal with all his exploited tokens.

logo
Publisher: Cointelegraph Magazine
Date: 2022-12-15T14:45:19 00:00
Author: Zhiyuan Sun
Twitter: @cointelegraphzn
Reference: (Read more) Visit Source



Hackers Bombard Open Source Repositories with Over 144,000 Malicious Packages

NuGet, PyPi, and npm ecosystems are the target of a new campaign that has resulted in over 144,000 packages being published by unknown threat actors.

Further analysis has revealed that the whole process was automated and that the packages were pushed over a short span of time, with a majority of the usernames following the convention "<a-z><1900-2022>."

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source



Hackers leak personal info allegedly stolen from 5.7M Gemini users

Gemini crypto exchange announced this week that customers were targeted in phishing campaigns after a threat actor collected their personal information from a third-party vendor.

In its short report, Gemini underlines that account information and its systems have not been impacted and that funds and customer accounts "remain secure."

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Hackers Breach TPG Telecoms' Email Host to Steal Client Data

It is worth noting that iiNet is an Australian internet service provider (ISP) acquired by TPG in September 2015 for $1.56 billion, while Westnet is a telecom company also owned by TPG.

TPG's cybersecurity adviser, Google-owned Mandiant , informed the company that they found evidence suggesting unauthorized access to a Hosted Exchange Service during a forensic review. 

logo
Publisher: HackRead | Latest Cyber Crime - InfoSec- Tech - Hacking News
Date: 2022-12-16T02:03:40 00:00
Reference: (Read more) Visit Source



These hackers used Microsoft-signed malicious drivers to further their ransomware attacks | ZDNET

Security firms have reported that multiple hacking groups have been using drivers signed by Microsoft in a series of attacks, including the deployment of Cuba ransomware. 

That development matters because many security services will implicitly trust anything signed by Microsoft,

logo
Publisher: ZDNET
Twitter: @ZDNET
Reference: (Read more) Visit Source



LEGO BrickLink bugs let hackers hijack accounts, breach servers

Two API security issues discovered by Salt Security could have allowed an attacker to take over members' accounts, access and steal personally identifiable information (PII) stored on the platform, or even gain access to internal production data and compromise internal servers.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Russian hackers claim to have infiltrated FBI | World | News | Express.co.uk

One screen recording appears to show the hacker inside the Facebook account of a US State Department employee.

 

The hackers are suspected of attempting to take down the Eurovision Song Contest website during Ukraine's performance at the 2022 contest, however the attack was thwarted by Italian authorities.

Publisher: Express.co.uk
Date: 2022-12-16T00:00:00 00:00
Author: Tim McNulty
Reference: (Read more) Visit Source



Hackers for hire: Meta takes down Indian firm's phishing network | Technology News,The Indian ...

Meta has taken down a network of fake accounts on Facebook and Instagram that were being operated by an Indian firm called CyberRoot Risk Advisory.

CyberRoot is part of the global surveillance-for-hire industry that targets people across the internet to collect intelligence, manipulate them into revealing information and compromise their devices and accounts.

logo
Publisher: The Indian Express
Date: 2022-12-16T00:27:37 05:30
Author: Soumyarendra Barik
Twitter: @The Indian Express
Reference: (Read more) Visit Source



Little Rock School District meets demands of hackers | thv11.com
logo
Publisher: thv11.com
Date: 10:09 PM CST December 15 2022
Twitter: @THV11
Reference: (Read more) Visit Source







🥰🍀💕❤️💋😘

https://sypuber.page.link/forestgods

Forest Gods. Click here.



Earth is nice. We want it.





No comments:

Post a Comment