article thumbnail

The Story of the 2011 RSA Hack

Schneier on Security

Really good long article about the Chinese hacking of RSA, Inc. They were able to get copies of the seed values to the SecurID authentication token, a harbinger of supply-chain attacks to come.

Hacking 325
article thumbnail

U.S. agency cautions employees to limit phone use due to Salt Typhoon hack of telco providers

Security Affairs

US CFPB warns employees to avoid work-related mobile calls and texts following China-linked Salt Typhoon hack over security concerns. The hacking campaign, called Salt Typhoon by investigators, hasn’t previously been publicly disclosed and is the latest in a series of incursions that U.S. and its allies for hacking activities in July.

Hacking 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

The Hacker News

Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of wallets spanning several blockchain platforms.

Hacking 139
article thumbnail

XDSpy APT remained undetected since at least 2011

Security Affairs

Researchers from ESET uncovered the activity of a new APT group, tracked as XDSpy, that has been active since at least 2011. XDSpy is the name used by ESET researchers to track a nation-state actor that has been active since at least 2011. SecurityAffairs – hacking, XDSpy). ” reads the abstract from the talk.

Malware 143
article thumbnail

Is Enumerating Resources on a Website "Hacking"?

Troy Hunt

In 2011, Patrick Webster identified a weakness in First State Superannuation's web portal which allowed him to access 770k financial records belonging to other customers. Now, to the question posed in the title, is any of this "hacking"? Seeing legal action appear as a result of enumerating through URLs is not unprecedented.

Hacking 213
article thumbnail

The Link Between AWM Proxy & the Glupteba Botnet

Krebs on Security

That same day, AWM Proxy — a 14-year-old anonymity service that rents hacked PCs to cybercriminals — suddenly went offline. AWMproxy, the storefront for renting access to infected PCs, circa 2011. Over the past decade, both Glupteba and AWM Proxy have grown substantially. But on Dec.

Passwords 300
article thumbnail

PlayStation Network outage has been going on for over 24 hours

Security Affairs

Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs hacking,Sony) The PSN breach exposed the data of millions of users, costing Sony $15 million in settlements and a year of identity theft protection for subscribers.