Keyword: hackers
-
Jaguar Land Rover’s suppliers have been warned that car production may not resume until November as the fallout from a devastating cyber attack grows. The company’s factory lines have already been paralysed for two weeks after hackers compromised its computer systems, a situation that has forced bosses to temporarily send thousands of plant workers home. But with the crisis now in its third week, senior insiders are understood to have told suppliers that production could be knocked out for another seven. One person briefed on the situation said senior JLR figures were divided on how long the shutdown would drag...
-
The halt to production at Jaguar Land Rover has been extended again as it grapples the impact of a cyber attack, with a trade union demanding a COVID-style furlough scheme for workers affected in the supply chain. There have so far been 12 days of costly inactivity as attempts to recover vital systems continue. Earlier this week, Monday had been slated as a possible day for manufacturing to restart but that has now been put back until Wednesday at least. The disruption is not only affecting output at JLR's factories but its supply chain too, with thousands of jobs threatened....
-
Jaguar Land Rover (JLR) has instructed factory staff to stay at home until at least Tuesday as the company continues to grapple with the fallout from a cyber attack. The attack at the weekend forced the company to take vital IT systems offline, which has affected car sales and production. Production remains halted at car factories in Halewood on Merseyside and Solihull in the West Midlands, as well as at its engine manufacturing centre in Wolverhampton. The situation remains under review and output could remain suspended for longer. Car sales have also been heavily disrupted, although the BBC understands some...
-
1/ Meet Gaurav Trivedi, an Indian scammer who impersonates Microsoft support and then rips off innocent vulnerable people. He tried to scam me......but instead of paying him money, I hacked into his laptop and turned on his live webcam feed. 2/ Gaurav runs a classic Microsoft tech support scam out of his apartment complex in Raebareli, India. It starts with a fake popup that locks your screen, blares a loud warning sound, and tells you to call “Microsoft” immediately or risk losing all your data.
-
Experts have warned hackers recently used a generative AI tool to replicate several web pages belonging to the Brazilian government in an effort to steal sensitive personal information and money. The fake websites were examined by Zscaler ThreatLabz researchers, who discovered multiple indicators of the use of AI to generate code. The websites look almost identical to the official sites, with the hackers using SEO poisoning to make the websites appear higher in search results, and therefore seem more legitimate. AI generated government websites In the campaign examined by ThreatLabz, two websites were spotted mimicking important government portals. The first...
-
OpenAI's ChatGPT can easily be coaxed into leaking your personal data — with just a single "poisoned" document. As Wired reports, security researchers revealed at this year's Black Hat hacker conference that highly sensitive information can be stolen from a Google Drive account with an indirect prompt injection attack. In other words, hackers feed a document with hidden, malicious prompts to an AI that controls your data instead of manipulating it directly with a prompt injection, one of the most serious types of security flaws threatening the safety of user-facing AI systems. ChatGPT's ability to be linked to a Gmail...
-
Foreign agents were able to penetrate the systems of the U.S. agency responsible for maintaining and designing nuclear weapons. The National Nuclear Security Administration, which operates under the United States Department of Energy, was compromised along with other sectors of the department. According to Bloomberg, while the NNSA is semiautonomous, it still holds the responsibility of producing and dismantling nuclear arms in the United States. This makes the intrusion even more concerning when considering the origins of those who penetrated the system. The Energy Department revealed in an email to Bloomberg that an "exploitation of a Microsoft SharePoint zero-day vulnerability...
-
China’s Ministry of State Security Directed the Theft of COVID-19 Research and the Exploitation of Microsoft Exchange Server Vulnerabilities, Known Publicly as the Indiscriminate ‘HAFNIUM’ Intrusion CampaignThe Justice Department announced today that Xu Zewei (徐泽伟), 33, of the People’s Republic of China was arrested on July 3 in Italy at the request of the United States. Xu and his co-defendant, PRC national Zhang Yu (张宇), 44, are charged in a nine-count indictment, unsealed today in the Southern District of Texas, for their involvement in computer intrusions between February 2020 and June 2021, including the indiscriminate HAFNIUM computer intrusion campaign that...
-
He walks with a cane and is a bit hard of hearing. Yet Boris Chertok, 95, a former deputy chief designer in the Soviet bureau that put the first Sputnik satellite into orbit 50 years ago, still has strong opinions on the evolution of the country's space program. Chertok says the free-market changes instituted by President Boris Yeltsin after the Soviet Union fell apart were disastrous for Russian science. "We need to restore what we have lost over 15 years of destructive reforms," said Chertok, whose very name was once a state secret. "The market economy is incapable of fulfilling...
-
Hackers with links to Iran are threatening to disclose emails stolen from the US President’s inner circle. The hackers, who go by the pseudonym Robert, told Reuters in an online chat that they have 100 gigabytes of stolen emails from Susie Wiles, the White House’s chief of staff, Lindsey Halligan, Trump’s lawyer, Roger Stone, Trump’s advisor and Stormy Daniels, the porn star at the centre of the Trump camp’s hush-money scandal.The group, Robert, said they could sell the material but didn’t provide Reuters with any details on their plans, nor describe what was in the emails. The US Cybersecurity and...
-
Prior to President Donald Trump authorizing targeted strikes against Iranian nuclear sites on Saturday, federal agents and Texas Department of Public Safety troopers have been arresting Iranian nationals, nearly all men, in the U.S. illegally. In the last few months, federal prosecutors have also brought terrorism charges against Iranians, including those in the U.S. working for the Iranian government. Iran is a designated state sponsor of terrorism. Iranian nationals illegally in the country are considered “special interest aliens” under federal law. The U.S. Department of Homeland Security on Sunday issued a warning to all Americans to be on a heightened...
-
Iran-based cryptocurrency exchange Nobitex has reportedly suffered a major security breach, resulting in the theft of over $81 million in digital assets by a hacker group claiming ties to Israel. CoinTelegraph reports that the Iranian cryptocurrency exchange Nobitex has fallen victim to a devastating hack, resulting in the loss of more than $81 million in digital assets. The attack, disclosed in a Telegram post on Wednesday, drained funds across the Tron network and Ethereum Virtual Machine (EVM)-compatible blockchains. According to noted crypto investigator ZachXBT, the attackers exploited the protocol using “vanity addresses,” which led to suspicious outflows from multiple Nobitex-linked...
-
President Jiang Zemin gets an update on China´s Terfenol-D project. The U.S. Navy spent millions of dollars to develop Terfenol-D in the early 1980s, and intelligence experts estimate that the People's Republic of China (PRC) has devoted extensive resources to try to steal it. Insight has learned that these PRC efforts have paid off. The spy target is an exotic material made up of two types of rare-earth metals called lanthanides, terbium and dysprosium, plus iron (FE). The NOL stands for Naval Ordnance Laboratory. Hence the name Terfenol-D. Those who have worked with this exotic material call it almost magical....
-
Hackers have leaked what they claim is AT&T’s database which was reportedly stolen by the ShinyHunters group in April 2024 after they exploited major security flaws in the Snowflake cloud data platform. But is this really the Snowflake-linked data? We took a closer look. As seen by the Hackread.com research team, the data was first posted on a well-known Russian cybercrime forum on May 15, 2025. It was re-uploaded on the same forum on June 3, 2025, after which it began circulating among other hackers and forums. After analyzing the leaked data, we found it contains a detailed set of...
-
For more than a decade, the United States has nurtured a secret intelligence partnership with Ukraine that is now critical for both countries in countering Russia... Nestled in a dense forest, the Ukrainian military base appears abandoned and destroyed, its command center a burned-out husk, a casualty of a Russian missile barrage early in the war. But that is above ground. Not far away, a discreet passageway descends to a subterranean bunker where teams of Ukrainian soldiers track Russian spy satellites and eavesdrop on conversations between Russian commanders. On one screen, a red line followed the route of an explosive...
-
Wikileaks founder Julian Assange was among the mourners attending Pope Francis’s funeral in St. Peter’s Square, Vatican City, on Saturday. Pope Francis had been a supporter of Assange and had even suggested giving him asylum in the Vatican. “Now Julian is free, we have all come to Rome to express our family’s gratitude for the Pope’s support during Julian’s persecution. Our children and I had the honor of meeting Pope Francis in June 2023 to discuss how to free Julian from Belmarsh prison. Francis wrote to Julian in… pic.twitter.com/1B4iNp31Is — WikiLeaks (@wikileaks) April 26, 2025 “Now Julian is free, we...
-
It all happened overnight and in a matter of minutes. Ben Zhou, CEO of the cryptocurrency exchange Bybit, made a series of routine transfers from his home computer. A short while later, his company called to inform him that his reserves of Ethereum, the second most-used cryptocurrency after Bitcoin, worth $1.5 billion, had vanished. By then, the ethers had already been transferred to thousands of other people’s digital wallets. Bybit had just suffered the largest theft in history. Five days later, the FBI confirmed what some analysts suspected from the outset: the attack was the work of Lazarus, a hacking...
-
An anonymous reader quotes a report from Ars Technica: A technique that hostile nation-states and financially motivated ransomware groups are using to hide their operations poses a threat to critical infrastructure and national security, the National Security Agency has warned. The technique is known as fast flux. It allows decentralized networks operated by threat actors to hide their infrastructure and survive takedown attempts that would otherwise succeed. Fast flux works by cycling through a range of IP addresses and domain names that these botnets use to connect to the Internet. In some cases, IPs and domain names change every day...
-
lon Musk revealed that the cyberattack which took down his social media app X on Monday seemingly originated in Ukraine. His bombshell revelation came during an interview with Fox Business Network on Monday afternoon following repeated glitches with his site, which has been down for much of the day. 'Well, we don't we're not sure exactly what happened, but there was a massive cyber attack to try to bring down the X system with IP addresses originating in the Ukraine area,' Musk said in the interview. Musk confirmed earlier in the day that X has been targeted by a 'massive...
-
Cryptocurrencies like Bitcoin and Ethereum are targets of choice for online criminals, who often exploit weaknesses in major trading platforms or individual users’ digital “wallets” to make major scores. A recent $1.5-billion heist of Ethereum from the Bybit platform — attributed by the FBI to North Korean hackers — is believed to be the largest yet in an ever-longer litany of thefts. How common is crypto theft? Cryptocurrencies are based on blockchain technology, which publicly records transactions between people holding and exchanging them. That has not kept a lid on theft, with an estimated $2.2 billion worth of the assets...
|
|
|