A Former Amazon Employee Charged for Digital Fraud. Sentencing in September

Paige Thompson Faces up to 20 Years for Wire Fraud Paige Thompson, 36, a resident of Seattle, who worked as an engineer in Amazon Web Services, has been charged with seven felonies. She has been found guilty of five cases of unauthorized access to protected systems, damaging a protected computer, and wire fraud. For fraud… Continue reading A Former Amazon Employee Charged for Digital Fraud. Sentencing in September

Team Xecuter’s life. How hackers leave after the arrest?

Team Xecuter, hackers, Hacking, Nintendo, FBI, U.S. DoJ

Gary Bowser, the Nintendo hacker, appears to be a very happy cybercriminal. Despite a prison term and another arrest, the 50-year-old Frenchman is enjoying life. So does his “collegue” – Max Louarn, the chief of Team Xecuter gang. The Nintendo Hacker keeps going As reported by SecurityLab in February of this year, Gary Bowser was… Continue reading Team Xecuter’s life. How hackers leave after the arrest?

Penetration Testing: Stages and Methods

What is penetration testing? Penetration testing is a method by which the security of computer systems and networks can be assessed by simulating a hacker’s attack. It is possible to attempt cracking systems and applications via penetration testing. It allows identifying vulnerabilities in applications’ interfaces, application programming interfaces, or elsewhere in the system. If such… Continue reading Penetration Testing: Stages and Methods

20 Dangerous Types of Cybersecurity Threats 2022

The cybersecurity threats in 2022 are more considerable than ever. Due to the emergence of efficient ransomware, coin miners, spyware, and so on, hacking has become a consistently profitable business. Knowing about cybersecurity threats is crucial because it livens up the safety measures. In addition, when you’re aware of what is up against you on… Continue reading 20 Dangerous Types of Cybersecurity Threats 2022

Hackers Use Fresh Vulnerability in Windows Print Spooler in Real Attacks

The US Infrastructure and Cybersecurity Agency (CISA) warned that a vulnerability in the Windows Print Spooler component, patched by Microsoft in February 2022, is being actively exploited by hackers. The issue in question is tracked as CVE-2022-22718 (CVSS score of 7.8) and, according to Microsoft, affects all versions of Windows. At the same time, the… Continue reading Hackers Use Fresh Vulnerability in Windows Print Spooler in Real Attacks

Anonymous hackers published the mail database of the Ministry of Culture of Russia

The media discovered that Anonymous hackers had made public a database of emails from the Russian Ministry of Culture, the administration of the city of Blagoveshchensk, and the office of the governor of the Tver region. The total size of the dump exceeded 700 GB. According to Kommersant, in the leaked documents you can find… Continue reading Anonymous hackers published the mail database of the Ministry of Culture of Russia

Hack group Lapsus$ returned from “vacation” and announced the hacking of Globant

The Lapsus$ extortionist group has returned from a “vacation” despite the recent arrest of seven of its members. The cybercriminals’ Telegram channel published data allegedly stolen from the Globant software development company. As evidence of the hack, the hackers first posted a screenshot showing a list of folders with the names of various companies from… Continue reading Hack group Lapsus$ returned from “vacation” and announced the hacking of Globant

Belarusian Cyber Partisans hack group attacked railway servers

A hack group that calls itself Belarusian Cyber Partisans claims to have attacked and encrypted the servers of the Belarusian Railways. The hacktivists said that the reason for the hack was the fact that Russia used the Belarusian railway to transfer troops and equipment. The group made a statement on Twitter and Telegram, claiming responsibility… Continue reading Belarusian Cyber Partisans hack group attacked railway servers

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and shutdown process and prevent them from ever happening. ZecOps has developed a new method to simulate restarting or shutting down the iPhone and thereby prevent the removal of malware from it, with which hackers can secretly track the victim through the microphone and phone camera.… Continue reading Spy method NoReboot allows simulating iPhone shutdown and prying through the camera