Friday , 20 April 2018
Home » Tag Archives: Hackers

Tag Archives: Hackers

Turla Targets Post Soviet States

Russian linked hackers Turla have been targeting consulates in post- Soviet states by using a new tool which uses malware to steal sensitive information, according to recent ESET research. View Full Story  ORIGINAL SOURCE: IB Times Read More »

Fancy Bear Hackers rush to Exploit Flash bug

Russian hacking group, the Fancy Bear’s, are rushing to exploit the recently disclosed Adobe Flash bug before patches are widely used. View Full Story  ORIGINAL SOURCE: IBTimes Read More »

Vietnam Lands in Chinese Hackers’ Sights Again

A hacking campaign is targeting large Vietnamese organizations—and is connected to the same party that previously targeted Vietnam Airlines back in 2016. View Full Story  ORIGINAL SOURCE: Info Security Magazine Read More »

Firms face £17m fine if they fail to protect against hackers

Firms could face fines of up to £17m or 4% of global turnover if they fail to protect themselves from cyber-attacks, the government has warned. The crackdown is aimed at making sure essential services such as water, energy, transport and health firms are safeguarded against hacking attempts. Firms will also be required to show they have a strategy to cover ... Read More »

Hackers could exploit solar power equipment flaws to cripple green grids, claims researcher

A Dutch researcher says he found a way to cause mischief on power grids by exploiting software bugs in solar power systems. Specifically, Willem Westerhof, a cybersecurity researcher at ITsec, said he uncovered worrying flaws within power inverters – the electrical gear turns direct current from solar panels into alternating current that can be fed into national grids. Read Full ... Read More »

Forget sexy zero-days. Siemens medical scanners can be pwned by two-year-old-days

Hackers can exploit trivial flaws in network-connected Siemens’ medical scanners to run arbitrary malicious code on the equipment. These remotely accessible vulnerabilities lurk in all of Siemens’ positron emission tomography and computed tomography (PET-CT) scanners running Microsoft Windows 7. These are the molecular imaging gizmos used to detect tumors, look for signs of brain disease, and so on, in people. ... Read More »

“Mind the (breach) gap”: Gemalto research reveals businesses overly confident about keeping hackers at bay, but less so about keeping data safe

Despite the increasing number of data breaches and nearly 1.4 billion data records being lost or stolen in 2016 (source: Breach Level Index), the vast majority of IT professionals still believe perimeter security is effective at keeping unauthorised users out of their networks. However, companies are under investing in technology that adequately protects their business, according to the findings of ... Read More »

Hackers Steal Billions in S.Korean Won by Hacking 4th Largest Bitcoin Exchange

Bithumb, one of the largest Bitcoin and Ether exchange platforms, has been hacked resulting in a loss of billions of South Korean Won with a number of user accounts compromised. Information such as users’ phone numbers, email addresses, etc. have been leaked as such, reports Bravenewcoin. Read Full Story  ORIGINAL SOURCE: HackRead Read More »

Hackers are offering to sell the Medicare details of Australians on the dark web, government confirms

Hackers are selling the Medicare card numbers of Australians on the ‘dark web’, which could be used to steal private health records. The Federal Government has confirmed it’s urgently investigating the security breach and has referred the matter to the Australian Federal Police. A journalist from The Guardian revealed he was able to purchase his own Medicare card details from a vendor ... Read More »

Median Dwell Time for Hackers Drops to 49 Days

The dwell time for hackers inside victim networks fell by nearly half over the past year, although the time from intrusion to containment of such threats remained virtually the same, according to Trustwave.   View Full Story  ORIGINAL SOURCE: Info Security Magazine Read More »