


We glimpse into the deep, not just trends.
Cybernews is an independent media outlet, where journalists and security experts debunk cyber by research, testing and data.
Follow for breaking news & original investigations
cybersecurity #infosec #tech
After losing billions to North Korea's Lazarus hackers, the crypto industry is stepping up efforts to block Bybit's stolen funds.
After losing billions to North Korea's Lazarus hackers, the crypto industry is stepping up efforts to block Bybit's stolen funds.
#Bybit #crypto #hacking #NorthKorea #cybercrime
Upon gaining initial access to a network, malicious hackers spend an average of 48 minutes finding and accessing critical assets.
Upon gaining initial access to a network, malicious hackers spend an average of 48 minutes finding and accessing critical assets.
#hacking #network #cybersecurity #datasecurity #cybercrime
https://cnews.link/hackers-stealing-data-at-unprecedented-speeds-1/
Despite bold claims from a prominent ransomware gang, Home Depot has denied its systems were penetrated.
Despite bold claims from a prominent ransomware gang, Home Depot has denied its systems were penetrated.
#ransomware #HomeDepot #hacking #cybersecurity
Detroit PBS confirmed a cyberattack, with Qilin ransomware releasing 345GB of stolen data.
Detroit PBS confirmed a cyberattack, with Qilin ransomware releasing 345GB of stolen data.
#Detroit #cyberattack #ransomware #cybercrime #cybersecurity
https://cnews.link/television-station-detroit-pbs-hacked-1/
#Detroit
Bybit hackers behind crypto's largest heist reportedly launder funds with meme coins and may have launched several.
Bybit hackers behind crypto's largest heist reportedly launder funds with meme coins and may have launched several.
#crypto #hacking #scam #memecoin
Cryptocurrency exchange platform Bybit has been robbed of over $1.46 billion worth of Ethereum.
Cryptocurrency exchange platform Bybit has been robbed of over $1.46 billion worth of Ethereum.
#crypto #Bybit #Etherium #hacking #cybercrime
Hackers from China are exploiting outdated internet-facing services for financial gain, though little else is known about them.
Hackers from China are exploiting outdated internet-facing services for financial gain, though little else is known about them.
#hacking #China #cyberattack #cybersecurity #ransomware
https://cnews.link/unknown-chinese-ransomware-gang-abuse-old-flaws-1/
China-based cybercrime groups are turning phished card data into mobile wallets.
China-based cybercrime groups are turning phished card data into mobile wallets.
#China #cybersecurity #phishing #Apple #Google #hackers
Hackers use Google Docs and other trusted platforms to stealthily control data-stealing malware.
Hackers use Google Docs and other trusted platforms to stealthily control data-stealing malware.
#hacking #Google #malware #cybersecurity #cybercrime
After a year-long investigation, Amsterdam's Cybercrime Team shut down a bulletproof hosting provider, seizing 127 servers.
After a year-long investigation, Amsterdam's Cybercrime Team shut down a bulletproof hosting provider, seizing 127 servers.
#Netherlands #Amsterdam #servers #cybercrime #cyebrsecurity
Russian hackers launch new attack vector: joining a meeting can compromise your account
Russian hackers launch new attack vector: joining a meeting can compromise your account
#Russia #Hacking #cybersecurity #cybercrime #account #cyberattack
https://cnews.link/russian-hackers-compromise-accounts-by-asking-to-join-meeting-1/
DeFi sector just saw another multimillion-dollar hack that also led to negotiations with the hacker, while another protocol is investigating a "potential issue."
DeFi sector just saw another multimillion-dollar hack that also led to negotiations with the hacker, while another protocol is investigating a "potential issue."
#Hacking #cybersecurity #DeFi #security
North Korean hackers have joined the cyberattack bandwagon, asking users to copy and paste malicious code into PowerShell.
North Korean hackers have joined the cyberattack bandwagon, asking users to copy and paste malicious code into PowerShell.
#NorthKorea #Hacking #cyberattacks #cybercrime #datasecurity
https://cnews.link/north-korean-hackers-kimsuky-exploiting-users-1/
A hacker arrested in October 2024 in connection with the hack on the Securities and Exchange Commission’s (SEC) X account has now pleaded guilty.
A hacker arrested in October 2024 in connection with the hack on the Securities and Exchange Commission’s (SEC) X account has now pleaded guilty.
#Hacking #SEC #SIM #cybercrime
Hackers have found ways to hide malicious code in AI models hosted on the Hugging Face platform, ReversingLabs researchers warn.
Hackers have found ways to hide malicious code in AI models hosted on the Hugging Face platform, ReversingLabs researchers warn.
#Hacking #cybersecurity #cybercrime #AI
https://cnews.link/malicious-ai-models-infiltrating-hugging-face-1/
An undisclosed hacker has been accused of over 40 cyberattacks on strategic organizations, including government, universities, NATO, and the US Army.
An undisclosed hacker has been accused of over 40 cyberattacks on strategic organizations, including government, universities, NATO, and the US Army.
#Hacking #NATO #USA #Army #cybersecurity #Spain
https://cnews.link/spanish-police-arrest-dangerous-hacker-1/
The US DoJ charged a former teen hacker with exploiting two DeFi protocols, stealing $65 million in crypto.
The US DoJ charged a former teen hacker with exploiting two DeFi protocols, stealing $65 million in crypto.
#Hacking #US #cybersecurity #cybercrime #teenager #Crypto
https://cnews.link/notorious-teen-hacker-charged-stealing-65m-crypto-defi-1/
SquareX's security research team uncovered a major hacking technique that allows adversaries to fully take over a user's browser and device.
SquareX's security research team uncovered a major hacking technique that allows adversaries to fully take over a user's browser and device.
#Hacking #CyberSecurity #cybercrime #Chrome #browser
https://cnews.link/browser-syncjacking-new-research-chrome-1/
Scammers called a victim using Google’s listed phone number and emailed from an official subdomain.
Scammers called a victim using Google’s listed phone number and emailed from an official subdomain.
#Google #Hacking #scammers #CyberSecurity #cybercrime
https://cnews.link/hackers-leverage-google-phone-number-subdomains-1/
The FBI, Europol, and international law enforcement seized hacker forums Crackedio, Nulledto, MySellIXio, and StarkRDPio on Wednesday.
The FBI, Europol, and international law enforcement seized hacker forums Cracked[.]io, Nulled[.]to, MySellIX[.]io, and StarkRDP[.]io on Wednesday.
#Hacking #Forum #FBI #cybersecurity #cybercrime
https://cnews.link/hacker-forums-cracked-nulled-mysellix-starkrdp-siezed-fbi-1/
Watch the documentary: https://www.youtube.com/watch?v=Vtj-RHEQn8M
@meatlotion@mas.erb.pw They weren't mentioned in the ESET research, but are most likely affected