26 links
tagged with all of: security + hacking
Click any tag below to further narrow down your results
Links
Security researchers have discovered a cryptocurrency mining operation that targets misconfigured DevOps infrastructure, specifically exploiting HashiCorp Nomad servers, Consul dashboards, Docker APIs, and Gitea code-hosting instances to mine Monero. The attackers utilize publicly available tools to avoid detection and recommend securing these systems to prevent future breaches.
A security researcher discovered significant vulnerabilities in Volkswagen's mobile app, which potentially allowed unauthorized access to personal and vehicle information. The flaws included exposure of sensitive data through API endpoints, enabling malicious actors to gain control over vehicles and access private customer details. After reporting the issues to Volkswagen, the researcher helped facilitate the necessary security fixes.
YouTuber Jeff Geerling challenged viewers to de-pixelate a heavily obscured section of his video, which was intended to protect private information. Within hours, a developer successfully restored the hidden content using frame extraction techniques, highlighting the weaknesses of pixelation as a privacy measure.
A critical vulnerability (CVE-2025-5947) in the Service Finder WordPress theme allows attackers to bypass authentication and gain administrator access, leading to significant exploitation attempts. With over 13,800 attempts recorded, users are urged to update to version 6.1 or discontinue use of the theme to mitigate risks.
DPRK hackers have successfully stolen approximately $137 million from users of the Tron blockchain. The attack involved sophisticated phishing techniques and targeted the platform's infrastructure, highlighting ongoing security vulnerabilities in cryptocurrency networks.
An Oregon agency has announced that hackers successfully stole sensitive data during a recent cyberattack. The breach has raised concerns about the security of personal information and the measures being taken to protect it moving forward.
Wallets can indeed be hacked, posing significant risks to digital asset security. Users must be aware of vulnerabilities in wallets and take necessary precautions to protect their funds from potential breaches and theft.
Hackers are exploiting the CVE-2025-42957 vulnerability in SAP systems, which can lead to significant security breaches. The flaw allows unauthorized access and manipulation of sensitive data, prompting urgent updates and patches from SAP to protect affected users.
A significant data breach at Lotte Card has exposed personal information of over 1 million users, with estimates suggesting the leak could impact several million. The Financial Supervisory Service's investigation revealed the breach was much larger than the initially reported 1.7 GB. Lotte Card is set to apologize and announce response measures on the 18th.
The article discusses the exposure of confidential informants within the Louisiana Sheriff's Office following a significant hack. Sensitive information was leaked, raising concerns about the safety and privacy of those involved in law enforcement operations. The breach highlights vulnerabilities in law enforcement data security and its potential consequences.
A security researcher successfully reverse engineered the Worldline Yomani XR credit card terminal, uncovering significant vulnerabilities, including an exposed root shell accessible through a debug connector. Despite robust tamper resistance features, the device's architecture separates secure and insecure processing, which limits the impact of the exploit but still poses serious security risks. The researcher disclosed the vulnerability to the manufacturer, initiating a timeline for public disclosure.
Mobile number hacking, particularly through SIM swap fraud, has become increasingly common, leading to significant financial losses for victims. Signs of a compromised mobile number include unexpected service issues and losing access to personal accounts. If you suspect your number has been hacked, it's crucial to contact your carrier, secure financial accounts, and take preventive measures against future attacks.
The article delves into the intricacies of evading security measures within a sandbox environment, highlighting techniques that exploit vulnerabilities in Chrome's architecture. It discusses various methods hackers use to bypass restrictions and emphasizes the ongoing cat-and-mouse game between security experts and malicious actors.
A recent Bloomberg report has revealed that a teenage hacker and his accomplice accessed a Crypto.com employee’s account, leading to a leak of users' personal data. Crypto.com stated that the breach affected a small number of individuals and confirmed that no customer funds were compromised.
Over 40,000 security cameras worldwide are accessible via the internet, allowing potential hackers to exploit them for spying and other malicious activities. The cybersecurity firm Bitsight warns that these cameras, often used in homes and small offices, are at risk due to inadequate security measures, making them targets for cyberattacks. Users are advised to implement stronger security practices to protect their devices.
Marks & Spencer has confirmed that personal data of its customers was compromised during a recent hacking incident. The breach has raised concerns about the safety of customer information and the company's security measures.
A hacking group known as The Com has leaked personal information of hundreds of US government officials, including those from the FBI, ICE, and the Department of Justice, on Telegram. The data, which includes names, addresses, and phone numbers, raises concerns about threats to these officials, particularly from criminal elements in Mexico. The group has hinted at potentially targeting IRS officials next.
Vulnerabilities in the Matrix protocol could allow hackers to take control of sensitive chat rooms, potentially compromising user privacy and security. These bugs could be exploited by attackers to manipulate conversations and access private messages, raising significant concerns for users relying on this communication platform.
Russian hackers have been exploiting vulnerabilities in Microsoft's OAuth 2.0 authentication framework, allowing them to access sensitive information from targeted accounts. This ongoing attack poses significant security risks for organizations using Microsoft services, emphasizing the need for enhanced security measures and awareness.
A BBC reporter was approached by a cyber-criminal gang offering a share of ransom money in exchange for access to the BBC's systems. After engaging with the criminals, they experienced tactics like MFA bombing, which highlighted the risks of insider threats in cyber-security. The incident underscored the evolving methods of hackers and the importance of vigilance within organizations.
Crosswalk buttons in various US cities have been hacked to play AI-spoofed voices of tech billionaires like Jeff Bezos and Elon Musk, thanks to poorly secured systems and default passwords. The Seattle Department of Transportation is addressing the issue, which has raised concerns for visually impaired pedestrians relying on audio cues. The manufacturer, Polara, has acknowledged the vulnerability and is working on enhancing security measures.
Riot Games is enhancing its security measures to combat hacking and cheating in its video games. By employing advanced technologies and strategies, the company aims to protect both its games and the integrity of its player community. Their ongoing efforts reflect a broader industry challenge in maintaining fair play in online gaming environments.
Discord experienced a security breach attributed to a vendor, rather than being directly hacked. The incident raised concerns about the platform's overall security practices and highlighted the risks associated with third-party vendors.
A new attack known as "pixnapping" has emerged, targeting Android devices by using pixel-stealing techniques to access sensitive information. This method allows attackers to manipulate the display output, potentially compromising user data without their knowledge. Users are advised to remain vigilant and update their security measures to protect against this threat.
Sangoma's FreePBX Security Team has issued a warning about a zero-day vulnerability actively being exploited in FreePBX systems with exposed Administrator Control Panels since August 21. Users are advised to limit access to their ACPs and implement a temporary EDGE module fix, while those with compromised systems are encouraged to restore from backups and secure their installations.
Hackers are exploiting a critical unauthenticated file upload vulnerability in the WordPress theme 'Alone,' enabling remote code execution and site takeovers. Wordfence has recorded over 120,000 exploitation attempts, and a patched version of the theme was released following the discovery of the flaw. Users are advised to update to version 7.8.5 to mitigate risks associated with this vulnerability.