Keyword: hacking
-
[H/T bitt]In what experts are calling the largest data breach ever recorded, researchers have confirmed the exposure of a staggering 16 billion password leaks, affecting platforms including Apple, Facebook, Google, Telegram, GitHub, VPN services, and even government portals. This unprecedented breach is believed to be the result of multiple infostealer malware campaigns operating at a massive scale throughout 2025. If the recently reported 184 million credential leak was alarming, this latest development represents a full-scale cybersecurity disaster that demands immediate action.What Happened? Understanding the 16 Billion Credential LeakAccording to an ongoing investigation by cybersecurity researchers at Cybernews, led by analyst...
-
Everything that connects to the internet can be hacked by malware. This includes your phones (both Android and iPhones) and laptops (whether Windows, Mac or even lesser-known systems like Linux). Devices like your Wi-Fi router and security cameras aren’t safe either. But who would have thought hackers are now targeting your smart TVs, streaming boxes, projectors and tablets, too? That’s right, the FBI warns that bad actors have hijacked over a million of these devices with malware, turning them into unwitting participants in a global cybercrime network. The FBI is warning that more than a million smart TVs, streaming boxes,...
-
President Jiang Zemin gets an update on China´s Terfenol-D project. The U.S. Navy spent millions of dollars to develop Terfenol-D in the early 1980s, and intelligence experts estimate that the People's Republic of China (PRC) has devoted extensive resources to try to steal it. Insight has learned that these PRC efforts have paid off. The spy target is an exotic material made up of two types of rare-earth metals called lanthanides, terbium and dysprosium, plus iron (FE). The NOL stands for Naval Ordnance Laboratory. Hence the name Terfenol-D. Those who have worked with this exotic material call it almost magical....
-
Hackers have leaked what they claim is AT&T’s database which was reportedly stolen by the ShinyHunters group in April 2024 after they exploited major security flaws in the Snowflake cloud data platform. But is this really the Snowflake-linked data? We took a closer look. As seen by the Hackread.com research team, the data was first posted on a well-known Russian cybercrime forum on May 15, 2025. It was re-uploaded on the same forum on June 3, 2025, after which it began circulating among other hackers and forums. After analyzing the leaked data, we found it contains a detailed set of...
-
Security researcher Jeremiah Fowler stumbled upon a large database of login information and passwords containing over 184 million records recently. He mentioned the discovery in an article on Website Planet. The data was not encrypted in any form and stored publicly, which meant that anyone with knowledge of its existence could download the data. The sheer size of the database, more than 47 gigabytes of data, makes it one of the largest leaks in recent history. In early 2024, a 70 million records password dump was discovered. A preliminary sampling of the data unveiled emails, usernames, passwords, and also links...
-
For more than a decade, the United States has nurtured a secret intelligence partnership with Ukraine that is now critical for both countries in countering Russia... Nestled in a dense forest, the Ukrainian military base appears abandoned and destroyed, its command center a burned-out husk, a casualty of a Russian missile barrage early in the war. But that is above ground. Not far away, a discreet passageway descends to a subterranean bunker where teams of Ukrainian soldiers track Russian spy satellites and eavesdrop on conversations between Russian commanders. On one screen, a red line followed the route of an explosive...
-
Swiss authorities in Zurich put Vladislav Klyushin, a Russian businessman widely noted for his Kremlin ties, on a flight bound for the U.S. on Saturday, ending a months-long extradition fight that cast a pall over this summer’s Putin-Biden talks in Geneva. Swiss reporters first confirmed Klyushin’s extradition Saturday night; the U.S. Justice Department on Monday said the 41-year-old, a top official at Moscow-based IT firm called M-13, would stand trial on charges of insider trading, citing information allegedly “stolen from U.S. computer networks,” netting “tens of millions of dollars in illegal profits.” The charges carry potentially decades’ worth of prison...
-
Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking, and gene research—could become a prime target for hackers. A study, published in IEEE Access, highlights growing concerns over how this powerful sequencing tool—if left unsecured—could be exploited for data breaches, privacy violations, and even future biothreats. Led by Nasreen Anjum from the University of Portsmouth’s School of Computing, this is the first comprehensive research study of cyber-biosecurity threats across the entire NGS workflow. NGS is a cornerstone of modern biotechnology, enabling rapid and cost-effective DNA and RNA sequencing that supports...
-
The West may be divided on tariffs, but all countries can agree that protecting global navigation satellite systems from interference from China, Russia and Iran is a matter of extreme importance. Disruptions would pose an immense economic and national security threat, costing trillions of dollars daily, dwarfing any market disruptions from tariffs.Global navigation satellite systems are free services that send positioning, timing and navigation systems to phones, banks and other electric utilities. America has the global positioning system (GPS), Europe has Galileo and China has Bei Dou. But these systems are vulnerable. They depend on satellites, which can be damaged...
-
Tulsi Gabbard says her team found proof that electronic voting machines are vulnerable to hacking! She’s calling for a nationwide return to paper ballots to safeguard election integrity. The revelation has triggered new investigations into voting system security. Election officials are now under pressure to respond. Looks like millions of “conspiracy theorists” are about to be vindicated. BREAKING: DNI Tulsi Gabbard says they have uncovered evidence that voting machines are vulnerable to hackers and exploitation aimed at manipulating vote results, which Gabbard says strengthens the mandate for paper ballots across the country.— Leading Report (@LeadingReport) April 10, 2025X Trending via...
-
This whole thing with China goes well beyond trade issues. We have known (or, at least, suspected) for years that China has been making cyber-incursions into American networks and systems. Now, in an exclusive Wall Street Journal report from Cybersecurity and Intelligence reporter Dustin Volz, we learn that in December, China made a tacit admission of being behind a series of attacks on American infrastructure.Chinese officials acknowledged in a secret December meeting that Beijing was behind a widespread series of alarming cyberattacks on U.S. infrastructure, according to people familiar with the matter, underscoring how hostilities between the two superpowers are...
-
New York University’s website was hacked on Saturday and its homepage replaced with purported SAT and ACT scores and GPAs for the 2024 student cohort, broken down by race.The hacker accused NYU of illegal admissions practices based on race. The alleged data posted on the hacked page reportedly showed that Asian students had higher average ACT and SAT scores, while white students had higher GPAs, compared to Hispanic and black applicants.The page featured a black background with green writing and the message: “On June 29 2023, racial affirmative action in college admissions was ruled illegal. Computer N–ggy Exploitation (CNE) reveals...
-
X just got hammered in a way we haven’t seen before. On Monday, the platform experienced a coordinated cyberattack so massive that it crippled services for hours. Elon Musk wasted no time, quickly confirming that the scale of the attack suggests it was likely carried out by either a powerful group or a nation-state. The implications of this are chilling. Reports started pouring in around 5:41 a.m., then surged again at 10:11 a.m., and once more at 11:11 a.m. Over 150,000 users reported issues. It wasn’t a minor outage. Something big was happening behind the scenes. You don’t get this...
-
Eight Defendants Were Employees of i-Soon, a Chinese Company Hacking at the Direction of the Chinese Government, and Two Defendants are Chinese Officials Who Directed the HacksMatthew Podolsky, the Acting United States Attorney for the Southern District of New York; Sue J. Bai, the Head of the U.S. Department of Justice’s National Security Division; and Leslie R. Backschies, the Acting Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced the unsealing of a two-count criminal Indictment charging 10 defendants with a years-long hacking scheme committed through the Chinese company i-Soon. At...
-
The French president also warned that Europe must be prepared for the US “not to be at our side” going forward. FRENCH PRESIDENT EMMANUEL Macron has said that peace “cannot be achieved by abandoning Ukraine” as he warned of the “real threat” to Europe from Russia. Addressing the nation over the current global uncertainty in the wake of the radical change in US policy on Ukraine under Donald Trump, Macron also said that Europe has to be ready for the US “not to be at our side” going forward. It comes amid the breakdown in relations between Trump and Ukrainian...
-
Google Chrome users have been warned to delete 16 “malicious” browser extensions that could lead to a security threat and “fraud” at the hands of a prolific “threat actor.” The extensions affect functionality involving screen capture, ad blocking, emoji keyboards and more, with a potential impact on at least 3.2 million users, according to GitLab Threat Intelligence, which first reported the threat. The extensions inject code and harmful scripts into browsers, allowing hackers to steal user data and engage in search-engine fraud involving ad revenue, according to Tom’s Guide. After users granted permission to use them, the extensions, while legitimate,...
-
The Wagoner County Sheriff's Office is warning of a new scam where hackers are compromising accounts using clickjacking. WCSO said clickjacking is an old scam with a new variation. Clickjacking is an method where hackers, scammers or other criminals hijack your clicks on one website, to perform malicious actions on another site. You might think you are clicking a button on the site you are currently browsing, but that click will be used for something different. WCSO said hackers have now added another click to this attack method to get around modern browsers no longer sending cross-site cookies. In the...
-
The Islamic Republic of Iran hacked former President Donald Trump’s campaign and turned over the stolen materials to the Biden-Harris campaign, federal officials said in a statement. Federal officials from ODNI, FBI, and CISA said in a joint statement that Iranian hackers sent the stolen materials to then-Biden-Harris campaign officials in June and July. Information that the hackers sent to the then-Biden-Harris campaign “contained an excerpt taken from stolen, non-public material from former President Trump’s campaign as text in the emails.” “This is further proof the Iranians are actively interfering in the election to help Kamala Harris and Joe Biden...
-
**SNIP** 1. Invest in personal data removal services: While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 2. Use personal security caution: Don't sign in to anything using your social media accounts. Sign in with your email instead and be sure to use an email address you've set aside just for these kinds of situations. 3....
-
The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient data to a remote IP address and downloads and executes files on the device. Contec is a China-based company that specializes in healthcare technology, offering a range of medical devices including patient monitoring systems, diagnostic equipment, and laboratory instruments. CISA learned of the malicious behavior from an external researcher who disclosed the vulnerability to the agency. When CISA tested three Contec CMS8000 firmware packages, the researchers discovered anomalous network traffic to a...
|
|
|