Hackers Breached Colonial Pipeline Using Compromised Password
An anonymous reader quotes a report from Bloomberg: The hack that took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast was the result of a single compromised password, according to a cybersecurity consultant who.....»»
Rain Technology protects consumers against visual hackers and snoopers at ATM terminals
Rain Technology announced ATM Switchable Privacy, designed to protect consumers against visual hackers and snoopers at ATM terminals in financial institutions, retail stores, restaurants, airports, and other public settings. ATM stats and state of th.....»»
Hackers claim 440GB of user data breached from large cybersecurity company
Hackers take 440GB of user data from one of the largest cybersecurity companies and post it to a hacking forum......»»
African countries are adopting two houses of parliament to boost democracy. But that"s not always what happens
At independence, most African states had two legislative chambers—a lower and upper chamber—in their parliament. African leaders saw that as a colonial legacy and as inefficient, so most states removed the upper chambers. Before 1990, only two st.....»»
Chinese hackers target Windows servers with SEO poisoning campaign
So far, a couple dozen websites, scattered mostly throughout Asia, were compromised......»»
The best free VPNs for 2024
We tried the best free VPNs that protect your personal data from hackers and advertisers at no cost and without cutting speed or features......»»
Chinese hackers are switching to new malware for government attacks
New attacks from the Chinese based Mustang Panda group reveal a change in tactics.....»»
Credit card info for 1.7 million users leaked in huge breach
Payment gateway provider Slim CD has been hit with a data breach where 1.7 million individuals had their sensitive data leaked to hackers......»»
Rippling IT helps IT teams boost security and banish busywork
If you’re an IT admin, you’ve got a lot on your plate. Managing the entire user lifecycle can feel like a complex laundry list of manual tasks: switching between systems, provisioning access, configuring and retrieving laptops, resetting password.....»»
Exposed: Russian military Unit 29155 does digital sabotage, espionage
The US Department of Justice has named five Russian computer hackers as members of Unit 29155 – i.e., the 161st Specialist Training Center of the Russian General Staff Main Intelligence Directorate (GRU) – which they deem resposible for t.....»»
Report documents paths to prison for those experiencing intimate partner violence
A new study provides extensive documentation of the "IPV-to-Prison Pipeline"—the pathways through which women who are survivors of intimate partner violence (IPV) find themselves serving long prison sentences for acts of survival......»»
Bitdefender Security for Creators protects YouTube content creators and influencers from hackers
Bitdefender unveiled Bitdefender Security for Creators, a service specifically designed for digital content producers, online creative professionals and social media influencers who are prime targets for account takeovers, fraud, and other cybercrime.....»»
North Korean hackers’ social engineering tricks
“North Korean malicious cyber actors conducted research on a variety of targets connected to cryptocurrency exchange-traded funds (ETFs) over the last several months,” the FBI has warned through a public service announcement. This suggest.....»»
Qilin ransomware targets Google Chrome credentials
Sophos X-Ops reveals a new strategy that harvests credentials from compromised networks, raising significant cybersecurity concerns for organizations......»»
New marine species found "hidden" in plain sight
An international team of researchers delved into museum collections and discovered new species of sponge-associated zoantharian, a small colonial organism similar to anemones......»»
EU investigating if Telegram played down user numbers to avoid regulation
The new probe is separate from the French investigation into the platform. Enlarge (credit: NurPhoto via Getty) Brussels is investigating whether Telegram breached EU digital rules by failing to provide accurate user num.....»»
Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says
Findings undercut pledges of NSO Group and Intgellexa their wares won't be abused. Enlarge (credit: Getty Images) Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surve.....»»
Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites
Suspected Russian hackers have been hitting iPhone and Android users visiting government websites with exploits first leveraged by commercial surveillance vendors, Google TAG researchers shared. The watering hole campaigns Between November 2023 and J.....»»
Rain Technology Laptop Switchable Privacy protects against visual hackers and snoopers
Rain Technology has introduced Laptop Switchable Privacy. Designed for tier one manufacturers and supply chain providers, the embedded screen technology protects against visual hackers and snoopers for enterprises and consumers — at the office or r.....»»
Unpatchable 0-day in surveillance cam is being exploited to install Mirai
Vulnerability is easy to exploit and allows attackers to remotely execute commands. Enlarge (credit: Getty Images) Malicious hackers are exploiting a critical vulnerability in a widely used security camera to spread Mira.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»