hacker

Exposed: Russian military Unit 29155 does digital sabotage, espionage

Exposed: Russian military Unit 29155 does digital sabotage, espionage 2024-09-06 at 17:01 By Zeljka Zorz The US Department of Justice has named five Russian computer hackers as members of Unit 29155 – i.e., the 161st Specialist Training Center of the Russian General Staff Main Intelligence Directorate (GRU) – which they deem resposible for the 2022 […]

React to this headline:

Loading spinner

Exposed: Russian military Unit 29155 does digital sabotage, espionage Read More »

Identity of Notorious Hacker USDoD Revealed

Identity of Notorious Hacker USDoD Revealed 2024-08-27 at 13:33 By Eduard Kovacs USDoD, the hacker known for high-profile data leaks, is a man from Brazil, according to CrowdStrike and others. The post Identity of Notorious Hacker USDoD Revealed appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Identity of Notorious Hacker USDoD Revealed Read More »

Equalizer DEX hacker drains funds: Users warned, investigation underway

Equalizer DEX hacker drains funds: Users warned, investigation underway 2024-05-14 at 14:02 By Cointelegraph by Josh O'Sullivan A hacker has siphoned tokens through a series of unauthorized transactions, leaving the crypto community in shock. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Equalizer DEX hacker drains funds: Users warned, investigation underway Read More »

Red teaming: The key ingredient for responsible AI

Red teaming: The key ingredient for responsible AI 2024-05-13 at 08:31 By Help Net Security Developing responsible AI isn’t a straightforward proposition. On one side, organizations are striving to stay at the forefront of technological advancement. On the other hand, they must ensure strict compliance with ethical standards and regulatory requirements. Organizations attempting to balance

React to this headline:

Loading spinner

Red teaming: The key ingredient for responsible AI Read More »

Kronos Research hacker shifts funds to Tornado Cash

Kronos Research hacker shifts funds to Tornado Cash 2024-05-07 at 11:01 By Cointelegraph by Prashant Jha Kronos Research was exploited for $25 million in November last year, and one of the six wallets linked to the hacker started moving funds to Tornado Cash on May 7. This article is an excerpt from Cointelegraph.com News View

React to this headline:

Loading spinner

Kronos Research hacker shifts funds to Tornado Cash Read More »

Hundred Finance hacker moves stolen assets a year after $7M exploit

Hundred Finance hacker moves stolen assets a year after $7M exploit 2024-05-02 at 15:01 By Cointelegraph by Ezra Reguerra The hacker holds about $4.3 million in various crypto assets in their Ethereum wallet. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Hundred Finance hacker moves stolen assets a year after $7M exploit Read More »

How to optimize your bug bounty programs

How to optimize your bug bounty programs 2024-04-22 at 08:02 By Mirko Zorz In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role bug bounty programs play in identifying security vulnerabilities and facilitating collaboration with researchers. He offers advice to organizations, stressing the importance of

React to this headline:

Loading spinner

How to optimize your bug bounty programs Read More »

Thinking outside the code: How the hacker mindset drives innovation

Thinking outside the code: How the hacker mindset drives innovation 2024-04-17 at 08:01 By Mirko Zorz Keren Elazari is an internationally recognized security analyst, author, and researcher. Since 2000, Keren has worked with leading Israeli security firms, government organizations, innovative start-ups, and Fortune 500 companies. She is the founder of BSidesTLV and Leading Cyber Ladies

React to this headline:

Loading spinner

Thinking outside the code: How the hacker mindset drives innovation Read More »

Hacker moves $10M from 2023 phishing incident to Tornado Cash

Hacker moves $10M from 2023 phishing incident to Tornado Cash 2024-03-21 at 16:01 By Cointelegraph by Ezra Reguerra The funds were taken from a crypto whale in 2023 when the holder signed transactions that allowed the attacker to access the funds. This article is an excerpt from Cointelegraph.com News View Original Source React to this

React to this headline:

Loading spinner

Hacker moves $10M from 2023 phishing incident to Tornado Cash Read More »

Cybercriminals embrace smarter strategies, less effort

Cybercriminals embrace smarter strategies, less effort 2024-01-29 at 06:33 By Help Net Security 2024 is shaping up to be a record-breaking year for data breaches, according to Experian. Despite 2023 being labeled as a ‘successful’ year for malicious actors, the upcoming months may bring forth developments that could further disrupt the cybersecurity landscape. Supply chain

React to this headline:

Loading spinner

Cybercriminals embrace smarter strategies, less effort Read More »

What custom GPTs mean for the future of phishing

What custom GPTs mean for the future of phishing 30/11/2023 at 08:03 By Help Net Security OpenAI is putting more power into the hands of users of GenAI, allowing them to create their custom AI agents without writing code. These custom GPTs are the latest leap forward in the rapidly evolving AI landscape, but this

React to this headline:

Loading spinner

What custom GPTs mean for the future of phishing Read More »

KyberSwap DEX exploited for $46 million, TVL tanks 68%

KyberSwap DEX exploited for $46 million, TVL tanks 68% 23/11/2023 at 05:02 By Cointelegraph By Martin Young The DEX aggregator has been exploited across multiple blockchains with millions in wrapped Ether and other assets stolen. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

KyberSwap DEX exploited for $46 million, TVL tanks 68% Read More »

The 3 key stages of ransomware attacks and useful indicators of compromise

The 3 key stages of ransomware attacks and useful indicators of compromise 08/11/2023 at 09:02 By Help Net Security For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we

React to this headline:

Loading spinner

The 3 key stages of ransomware attacks and useful indicators of compromise Read More »

Crypto gambling site Stake sees $16M withdrawals in possible hack

Crypto gambling site Stake sees $16M withdrawals in possible hack 04/09/2023 at 20:02 By Cointelegraph By Tom Blackstone Unusually large withdrawals were made from Stake to an account with no previous activity, including $3.9 million in Tether and $9.8 million in Ether. This article is an excerpt from Cointelegraph.com News View Original Source React to

React to this headline:

Loading spinner

Crypto gambling site Stake sees $16M withdrawals in possible hack Read More »

Large-scale breaches overshadow decline in number of healthcare data incidents

Large-scale breaches overshadow decline in number of healthcare data incidents 23/08/2023 at 06:04 By Help Net Security While H1 2023 saw an encouraging decrease in the overall number of data breaches impacting healthcare organizations, it was overshadowed by large-scale breaches resulting in a significant increase in the number of individuals affected, which reached record levels,

React to this headline:

Loading spinner

Large-scale breaches overshadow decline in number of healthcare data incidents Read More »

Generative AI outperforms hackers but not their creativity

Generative AI outperforms hackers but not their creativity 14/07/2023 at 08:02 By Help Net Security 72% of hackers are confident that AI cannot replace human creativity in security research and vulnerability management, according to Bugcrowd. Generative AI hacking Generative AI was a major theme in the 2023 report, with 55% of respondents saying that it

React to this headline:

Loading spinner

Generative AI outperforms hackers but not their creativity Read More »

To enable ethical hackers, a law reform is needed

To enable ethical hackers, a law reform is needed 09/05/2023 at 08:13 By Help Net Security Organizations need to be able to match the ingenuity and resources of cybercriminals to better defend themselves against the increasing number of threats and attacks that could paralyze their business. Unfortunately, some laws restrict genuine security research. As we

React to this headline:

Loading spinner

To enable ethical hackers, a law reform is needed Read More »

Scroll to Top