Il 19enne membro della cyber-gang d’élite Scattered Spider rischia 60 anni di reclusione
Link all'articolo : https://www.redhotcyber.com/post/il-19enne-membro-della-cyber-gang-delite-scattered-spider-rischia-60-anni-di-reclusione/
Un membro del gruppo #hacker di Scattered Spider, è stato accusato di furto di criptovaluta su larga scala e #operazioni di hacking dei #sistemi aziendali. Noah Michael Urban è stato arrestato all’inizio del 2024 , patteggiando le accuse in Florida, dove è stato accusato di #frode e furto di #identità.
Going to write a blog about how I view this as a major turning point in the #hacking subculture. Erik Bloodaxe publicly stated at Summercon #hacker convention in 1992 that ratting out fellow #hackers to the FBI over hacker beef was actually the correct and proper thing to do.
https://phrack.org/issues/40/11
Sleepy talks about Surveillance and the Renaissance. What is the landscape of surveillance today. This is a problem that we are neck deep into as a population without real understanding of the potential repercussions of future generations.
Reference:
The Art of Invisibility
By Kevin Mitnick
Permanent Record
By Edward Snowden
Die Babuk Ransomware Gruppe (babuk-bjorka) hat heute auf ihrer Website im Darknet bekanntgegeben, dass sie Rheinmetall Defence (rheinmetall.com) gehackt hat.
Zwecks Auffindbarkeit ein paar Hastags dazu:
Untersuchte Hersteller: #Huawei #Sungrow #GinlongSolis #Goodwatt #GoodWe #SMA
Allgemein: #PV #WR #Wechselrichter #Solar #Inverter #SunDown #Forescout #China #Hacker #SmartHome #IoT
https://www.forescout.com/research-labs/sun-down-a-dark-side-to-solar-energy-grids/
@bsi
Recommendations
Manufacturers
Development • Devices: holistic security architecture including secure boot, binary hardening, anti-exploitation features, permission separation etc
• Applications: proper authorization checks on web applications, mobile applications and cloud backends
Testing • Regular penetration testing on applications and devices • Consider bug bounty programs
Monitoring Web Application Firewalls Remember that a WAF does not protect against logical flaws
Users
Residential and commercial users • Change default passwords and credentials • Use role-based access control • Configure the recording of events in a log • Update software regularly • Backup system information • Disable unused features • Protect communication connections
Commercial and utility installations (in addition) •
Include security requirements into procurement considerations
• Conduct a risk assessment when setting up devices • Ensure network visibility into solar power systems • Segment these devices into their own sub-networks • Monitor those network segments
Die letzte der frühen #hacker.innen hat mit 101 Jahren den Weg über den angetreten.
Nordkoreanische "IT-Krieger" bewerben sich verstärkt für Remote-Jobs in Deutschland und Europa. Ziel: Zugang zu Geschäftsgeheimnissen und mögliche Erpressungsversuche. #Cybersecurity #Hacker #Nordkorea https://winfuture.de/news,150046.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
Etliche sensible #Daten von Kunden von #Samsung #Deutschland wurden nun geklaut und werden im Darknet verkauft. Dabei sind auch Namen, Telefonnummern und Adressen. Der #Hacker hatte erschreckend leichtes Spiel. https://winfuture.de/news,150009.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
#KI und #Cybersecurity
Wie uns KI vor #Hacker-Angriffen schützen kann
Für die #IT-Sicherheit ist Künstliche Intelligenz längst unersetzlich. Moderne #Virenscanner hätten wohl einige der bekanntesten #Cyberangriffe der Geschichte verhindert. KI-Tools, die uns schützen sollen, können aber auch zur Gefahr werden. #podcast #datenschutz #news #nachrichten
https://www.deutschlandfunk.de/ki-cybersecurity-hackerangriffe-computerviren-sicherheit-100.html
PI: Stützt sich die Berichterstattung über rechtsextemistische Inhalte eines Chatverlaufs einer namentlich benannten Person auf eine von einem #Hacker erstellte sog. html-Datei, muss die Authentizität der Datei und die Vertrauenswürdigkeit des Hackers besonders sorgfältig geprüft werden.
Hisense Tv D-app by Darkart (hisense tv developer app) This program is intended solely for ethical and educational purposes. #anon #anonymous #graphicdesign #programing #coding #engineers #tech #technology #hacker #hacking #python #linux #c #rust #sql #security #tv #hisense
LG TV D-APP by Darkart (LG tv developer app) This program is intended solely for ethical and educational purposes. #anon #anonymous #graphicdesign #programing #coding #engineers #tech #technology #hacker #hacking #python #linux #c #rust #sql #security #tv #samsung
Samsung Tv D-APP by Darkart (Samsung tv developer app) This program is intended solely for ethical and educational purposes. #anon #anonymous #graphicdesign #programing #coding #engineers #tech #technology #hacker #hacking #python #linux #c #rust #sql #security #tv #samsung
As I’ve still got a fair bit of time to kill I am going to watch another #hacker adjacent movie today, crime caper Fled from back in 1996. Lawrence Fishburne escapes from a prison chain gang shackled to Stephen Baldwin who plays some kind of high tech fraudster.
https://youtu.be/HcI_nr9zgr0
I’m finally watching “Bait” today, a 2000 crime comedy (?) that I think revolves around an attempt to apprehend a #hacker, with various hijinks interspersed. It looks cheesy as hell.
https://youtu.be/68V7hSZO6lE