PewDiePie fans hack The Wall Street Journal and more printers
Fans of YouTube star PewDiePie have hacked printers again. They also attacked The Wall Street Journal. The fans hope that their actions will win more followers for the vlogger in his fight against the Bollywood music channel T-Series. That's what Silicon Angle reports.
The vlogger is in a battle wi... Read more
Global hack campaign focuses on nuclear and energy companies
A global hack campaign called Operation Sharpshooter focuses on nuclear, defence, energy and financial companies. That's what McAfee says in a new report.
The campaign has already infiltrated dozens of companies, mainly in the United States and other English-speaking countries. The hackers post rogu... Read more
“Equifax hack was completely preventable with basic security measures.
According to a report by the American House Oversight Committee, the hack at Equifax in 2017 was completely preventable. That's what TechCrunch reports. The company had substandard security practices and policies, according to the report. Systems were also outdated.
In September last year, Equifax, ... Read more
Czech Republic accuses Russia of several attacks on government networks
The Czech Republic accuses Russia of invading their government networks, reports ZDNet. The country's intelligence service, BIS, states in an annual report that two espionage groups linked to Russia entered the networks.
These are the groups Turla and APT28, also known as Fancy Bear. The groups are ... Read more
Account data of one hundred million users Quora hacked
The data of more than one hundred million users of question-and-answer site Quora have been stolen. Quora describes the hack as an unauthorized access to one of our systems by a third party. The hack took place on November 30th.
Quora reports that in an extensive blog. Last Friday it was discovered ... Read more
Hackers abuse NSA malware to crack internal networks
Akamai has discovered a remarkable new malware campaign. The hackers behind it change the settings of home and office routers. This allows them to connect to internal networks and also infect previously isolated devices.
According to Akamai Sun, there are 277,000 routers with these vulnerable UPnP s... Read more
Hacker places malware in popular JavaScript library
A hacker has managed to place code in a popular JavaScript library that steals bitcoin. This is a library that many companies use. The impact could therefore potentially be very large, although there is still some uncertainty about this.
The hack included placing code in Event-Stream, a JavaScript ... Read more
Rowhammer attacks can bypass ECC memory protection
Researchers at the Vrije Universiteit in Amsterdam have described in a paper a new variation of the Rowhammer attack, which makes the attack successful on ECC memory. Rowhammer is a group of exploits that exploit an error in the design of modern memory cards.
A memory card stores temporary data as s... Read more
Dropbox researchers accidentally found 3 zero days in Apple software
The Dropbox red team accidentally discovered a zero day in Apple software. While one of the company's teams was investigating how its software responds to cyber-attacks, it discovered a number of zero-day vulnerabilities.
The Offensive Security red team - a group of specialists tasked with attackin... Read more
Emotet malware includes unique infrastructure to prevent down-time
According to security company Trend Micro, Emotet's malware corridor deliberately designed the backbone infrastructure of its server in two separate clusters.
Researchers analyzed 571 samples of the group's malware. It allowed them to extract the IP addresses of 721 Emotet command-and-control (C&... Read more