Sat.Sep 21, 2024

article thumbnail

Hackers stole over $44 million from Asian crypto platform BingX

Security Affairs

Cybercriminals stole more than $44 million worth of cryptocurrency from the Singaporean crypto platform BingX. Singaporean crypto platform BingX reported a cyberattack on Friday. Threat actors stole over $44 million worth of cryptocurrency. The crypto platform discovered unauthorized transfers of funds on Thursday night, shortly before BingX announced a shutdown for “wallet maintenance” on social media. [ Temporary Wallet Maintenance Notice] ■ Schedule: ~24 hours ■ When maintenance i

article thumbnail

Ukraine Bans Telegram Use for Government and Military Personnel

The Hacker News

Ukraine has restricted the use of the Telegram messaging app by government officials, military personnel, and other defense and critical infrastructure workers, citing national security concerns. The ban was announced by the National Coordination Centre for Cybersecurity (NCCC) in a post shared on Facebook.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OP KAERB: Europol dismantled phishing scheme targeting mobile users

Security Affairs

A joint international law enforcement operation led by Europol dismantled a major phishing scheme targeting mobile users. Europol supported European and Latin American law enforcement agencies in dismantling an international criminal network that unlocks stolen or lost mobile phones using a phishing platform. The organization operated a phishing-as-a-service (PhaaS) platform called iServer, which had over 2,000 registered users.Crooks targeted at owners of mobile devices that were attempting to

Mobile 138
article thumbnail

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks

The Hacker News

A hacktivist group known as Twelve has been observed using an arsenal of publicly available tools to conduct destructive cyber attacks against Russian targets. "Rather than demand a ransom for decrypting data, Twelve prefers to encrypt victims' data and then destroy their infrastructure with a wiper to prevent recovery," Kaspersky said in a Friday analysis.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Understanding and adhering to cybersecurity regulations is crucial for any organization as cyber threats evolve and become more sophisticated. The landscape of cybersecurity laws and regulations today is set to undergo significant changes, impacting businesses, government entities, and individuals alike. Let’s explore what to expect from the upcoming regulations, provide insights into critical federal and state laws, and offer practical compliance and risk management strategies.

article thumbnail

LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO

The Hacker News

The U.K. Information Commissioner's Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing users' data in the country to train its artificial intelligence (AI) models. "We are pleased that LinkedIn has reflected on the concerns we raised about its approach to training generative AI models with information relating to its U.K.

More Trending

article thumbnail

Interactive PDF Analysis: An Open Source Forensic Tool for Threat Detection

Penetration Testing

PDF files are a staple in today’s digital world, used for everything from business documents to user manuals. However, like any widely adopted format, PDFs can be exploited to carry... The post Interactive PDF Analysis: An Open Source Forensic Tool for Threat Detection appeared first on Cybersecurity News.

article thumbnail

7 reasons why I choose Android over iOS (and sideloading is not one of them)

Zero Day

Many years ago, I decided Android was the mobile operating system for me. But what is it about Google's OS that I find more appealing than Apple's?

Mobile 98
article thumbnail

Beware of Fake Downloads: AsyncRAT Spreads via Popular Software Cracks

Penetration Testing

In an alarming trend observed by McAfee Labs, cybercriminals have refined their tactics, luring unsuspecting users into downloading AsyncRAT malware disguised as popular cracked software. This evolving menace leverages the... The post Beware of Fake Downloads: AsyncRAT Spreads via Popular Software Cracks appeared first on Cybersecurity News.

article thumbnail

Upgrade to Windows 11 Pro for $20 right now - here's how

Zero Day

Save 89% on a Windows 11 Pro license for more productivity features to help you get things done.

75
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

USENIX NSDI ’24 – Autothrottle: A Practical Bi-Level Approach to Resource Management for SLO-Targeted Microservices

Security Boulevard

Authors/Presenters:Zibo Wang, Pinghe Li, Chieh-Jan Mike Liang, Feng Wu, Francis Y. Yan Awarded Outstanding Paper! Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center.

64
article thumbnail

I bought the iPhone 16 Pro for just one reason - and AI's got nothing to do with it

Zero Day

If you're also an avid photographer but don't want to carry your digital camera everywhere, upgrading this year might be wise.

75
article thumbnail

ZeroLogon to NoPac Vulnerability: Black Basta Group’s Exploit Arsenal Revealed

Penetration Testing

Qualys has released a comprehensive report shedding light on the Black Basta ransomware, a highly disruptive threat that has wreaked havoc across industries since its emergence in April 2022. Operating... The post ZeroLogon to NoPac Vulnerability: Black Basta Group’s Exploit Arsenal Revealed appeared first on Cybersecurity News.

article thumbnail

Learn a new language with 74% off a Babbel subscription right now

Zero Day

Save $449 on a Babbel Language Learning subscription and learn 14 new languages with this deal.

40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Profiling the Gaza Hackers Team

Security Boulevard

In the following post I'll profile the Gaza Hackers Team. Sample photos: Primary group's domains: hxxp://gaza-hacker.com hxxp://hacker.ps hxxp://gaza-hacker.net hxxp://gaza-hack.org hxxp://gaza-hack.info hxxp://xhackerx.com hxxp://gaza-hack.com hxxp://gaza-hackers.com Primary group's email address accounts: moayy2ad@hotmail.com c-e@hotmail.com le0n005061@gmail.com Related domain names registered using the same email address accounts: hxxp://frontat.com hxxp://nswaa.com hxxp://elsahefa.com hxxp:/

article thumbnail

Weekly Update 418

Troy Hunt

Just watching back through bits of this week's video, the thing that's really getting at me is the same thing I've come back to in so many past videos: lack of organisational disclosure after a breach. Lack of disclosure to impacted customers, lack of disclosure to the public, and a general apathy towards the transparency with which we expect organisations to behave post-breach.

article thumbnail

Iranian Hackers Tried to Give Hacked Trump Campaign Emails to Dems

WIRED Threat Level

Plus: The FBI dismantles the largest-ever China-backed botnet, the DOJ charges two men with a $243 million crypto theft, Apple’s MacOS Sequoia breaks cybersecurity tools, and more.

Hacking 117