A group of hackers has been caught running a large-scale cyber spying operation, now called REF7707. The attack was first noticed in November 2024 when strange activity was detected in the Foreign Ministry of a South American country. As…
Category: EN
Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange
Over 400,000 ETH and stETH worth more than $1.5 billion were stolen from the Bybit cryptocurrency exchange. The post Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Russian State Actors Target Microsoft 365 Accounts Via Device Code Phishing Campaign
A hacking outfit potentially linked to Russia is running an active operation that uses device code phishing to target Microsoft 365 accounts of individuals at organisations of interest. The targets are in the government, non-governmental organisations (NGOs), IT services…
Hackers Leak 15,000 FortiGate Device Configs, IPs, and VPN Credentials
A newly identified hacking group, the Belsen Group, has leaked critical data from over 15,000 FortiGate devices on the dark web, making sensitive technical details freely available to cybercriminals. The leak includes configuration files, IP addresses, and VPN credentials,…
ADR Report | Application Detection and Response Trends | Contrast Labs
In a startling finding, Contrast Security Application Detection and Response stopped tens of thousands of attacks that made it past perimeter defenses on a single application in mid-January 2025. The post ADR Report | Application Detection and Response Trends |…
$1.4 Billion Stolen From ByBit in Biggest Crypto Theft Ever
Plus: Apple turns off end-to-end encrypted iCloud backups in the UK after pressure to install a backdoor, and two spyware apps expose victim data—and the identities of people who installed the apps. This article has been indexed from Security Latest…
Apple removes iCloud encryption in UK following backdoor demand
Apple removed iCloud’s Advanced Data Protection in the UK after the government requested encryption backdoor access. Apple ends iCloud end-to-end encryption in the United Kingdom following the government’s request for encryption backdoor access. Advanced Data Protection is now unavailable for…
Huge Data Leak Puts 2.7 Billion Records at Risk – What You Should Know
A security issue has surfaced involving an unprotected database linked to Mars Hydro, a Chinese company known for making smart devices like LED grow lights and hydroponic equipment. Security researcher Jeremiah Fowler discovered this database was left open without…
The Dark Side of AI: Project Synapse
Unveiling the Complexities: The Dark Side of AI and Its Real-World Implications In this episode, explore the intricate discussions surrounding AI with experts Marcel Gagné, John Pinard, and Jim Love. Dive into contemporary understandings of AI, its potential threats, and…
Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
Cryptocurrency exchange Bybit on Friday revealed that a “sophisticated” attack led to the theft of over $1.46 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history. “The…
Bybit Hack: Massive $1.5 Billion Worth Ethereum Stolen
The biggest hack in Crypto industry, the Bybit exchange has confirmed a major security breach resulting in the… The post Bybit Hack: Massive $1.5 Billion Worth Ethereum Stolen appeared first on Hackers Online Club. This article has been indexed from…
OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns
OpenAI on Friday revealed that it banned a set of accounts that used its ChatGPT tool to develop a suspected artificial intelligence (AI)-powered surveillance tool. The social media listening tool is said to likely originate from China and is powered…
Salt Typhoon Hackers Exploit Cisco Vulnerability To Gain Access To U.S. Telecom Networks
Cisco Talos has uncovered a sophisticated cyberespionage campaign by the state-aligned “Salt Typhoon” group targeting U.S. telecommunications infrastructure since late 2024. While credential theft remains their primary entry method, researchers confirmed exploitation of Cisco’s CVE-2018-0171 Smart Install Remote Code Execution…
New Guidelines: Cybersecurity Resilience in the Healthcare Industry
Lou Morentin, VP of Compliance & Privacy There are a number of significant changes coming to Healthcare Cybersecurity requirements. While not all are finalized, they point the way towards Health and Human Services tightening the controls and requirements. Healthcare Cybersecurity:…
Feel Relieved with Effective Secrets Sprawl Control
Are You Aware of the Risks Associated with Secrets Sprawl? You understand the inherent risks associated with secrets sprawl. You have likely dealt with serious repercussions due to lack of visibility and poor secrets lifecycle management, experiencing firsthand how these…
Stay Calm: Securing Your Enterprise Against Leaks
Why Is Protecting Your Enterprise From Data Leaks So Crucial? Where data is the lifeblood of organizations and data breaches are becoming more common, can we truly afford to be complacent about enterprise security? High-profile breaches reveal the extensive damage…
Achieving Satisfaction in Cloud Security Investments
Is Your Cloud Security Investment Paying Off? The role of cloud security becomes paramount. At the heart of this security conundrum is an often-overlooked element – Non-Human Identities (NHIs). It is fascinating to observe how the management of these identities…
The Judicial Conference Should Continue to Liberally Allow Amicus Briefs, a Critical Advocacy Tool
< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> EFF does a lot of things, including impact litigation, legislative lobbying, and technology development, all to fight for your civil liberties in the digital age. With litigation,…
Week in Review: More telecoms breached, Chase blocks Zelle, more DeepSeek bans
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest TC Niedzialkowski, former CISO Thanks to our show sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any…
Bybit Hack: $1.4B Stolen from World’s 2nd Largest Crypto Exchange
In a major cybersecurity incident, Bybit, the world’s 2nd-largest crypto exchange suffered a $1.4 billion ETH hack from… This article has been indexed from Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News Read the original article: Bybit Hack:…