Hacking | News, how-tos, features, reviews, and videos

Ransomware  >  A coin-operated lock ransoming an encrypted system.
Hacking stealing password data

malvertising malware hacked ads advertising online

DUCKTAIL malware campaign targeting Facebook business and ads accounts is back

The spear phishing group has revised its tactics and is employing more sophisticated techniques and tactics based on what appears to be extensive research into Facebook business and ads management accounts.

man looking through binocs spy hacker breach infiltrate gettyimages 164644457 by selimaksan 2400x16

Know thy enemy: thinking like a hacker can boost cybersecurity strategy

Putting on a red hat and trying to understand the motivations, expectations, behaviors, and goals of bad actors can be a key part of a solid cybersecurity plan.

computer hacked system error virus cyber attack malware concept. danger symbol. 3d rendering

Iran’s nuclear energy agency confirms email server hacked

Iranian hacking group Black Reward has claimed responsibility for a breach at the email server of the country's Bushehr nuclear power plant, in support of nationwide protests over the death of a young woman in police custody.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

Election security, misinformation threats loom large ahead of the US midterms

The FBI and CISA say election infrastructure is secure, but threat actors have other ways to undermine confidence in the US midterm elections.

Security threat [illustration]  >  A hacker with black hat, mask, and crowbar breaks into a laptop.

Most hackers need 5 hours or less to break into enterprise environments

A new survey of 300 ethical hackers provides insight into not only the most common means of initial access but how a complete end-to-end attack happens.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

Social media's role in spreading U.S. election disinformation in the spotlight

Before Twitter's former CISO sounded the alarm bell, the U.S. government defined steps to counter misinformation and disinformation at the state, local and federal levels.

DDOS attack

Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says

Russian cybercollective Killnet dropped evidence of possible collaboration with ransomware gang Conti in its hacking campaign against Lithuania on a Telegram channel, security company Flashpoint reports.

job search machine learning ai artifical intelligence robotics automation

9 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

CSO: Have you met these hackers? [slide 11]

DOJ: Good faith security research won’t be charged under Computer Fraud and Abuse Act

The U.S. Department of Justice revises its policy regarding charging violations of the CFAA. Good faith security research will no longer be charged.

cso security hacker breach infiltrate dark web gettyimages 892701338 by peopleimages 2400x1600px

Karakurt data thieves linked to larger Conti hacking group

Data theft group has apparent ties to another, more prolific hacking crew, according to cybersecurity firm Tetra Defense.

lion cub parent teaching child nature animal growl yawn

Take LAPSUS$ teens seriously

After the Okta breach, LAPSUS$ is already back making trouble using low-tech techniques with a high rate of success.

Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

Zoom’s bug bounty ROI clear as program pays $1.8 million to fix over 400 bugs

The firm’s CISO reflects on bug bounty ROI and selling the concept to senior leadership.

CSO  >  Botnet  >  Robots amid a blue binary matrix

What is a botnet? When infected devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised to launch DDoS attacks, spread phishing spam, mine bitcoin, and more.

cso security hacker breach ransomeware gettyimages 1081349274 by sestovic 2400x1600px

What is ethical hacking? Getting paid to break into computers

Learn the ethical hacking certifications, training, and experience you need to land a job testing an organization's defenses.

man in the middle phone on a string communicaiton

Man-in-the-middle (MitM) attack definition and examples

A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data....

A group of anonymous hooded figures exist amid raining streams of binary code. [security threats]

Rash of hacktivism incidents accompany Russia’s invasion of Ukraine

Some in the cybersecurity community say actions on behalf of Ukraine help even the odds, while others warn that unauthorized hacking could interfere with government cyber operations.

election hacking security 2020 election security flag global breach by stuartmiles99 getty

FBI's warning about Iranian firm highlights common cyberattack tactics

One known tactic is conducting reconnaissance on potential targets, then working to identify entry points including vulnerable software or systems.

train tracks converge / rails switch / paths merge / convergence / directory traversals

6 ways hackers hide their tracks

From trusted pentesting tools to LOLBINs, attackers abuse trusted platforms and protocols to evade security controls.

Load More
You Might Also Like