TOP CYBER NEWS

  • HOME
  • ATTACKS
  • MALWARES
  • STRATEGIES
  • THREATS
    • Threat Defense
    • Threats Analysis

US Sets $5 Million Bounty For Russian Hacker Behind …

Friday, 06 December 2019 by Top Cyber News
Maksim Yakubets and his crew stole tens of millions using Zeus and Dridex, with victims including Bank of America, Key Bank, GenLabs, and United Dairy, DoJ says. The US State Department in collaboration with the US Department of Justice and the FBI Thursday announced an unprecedented $5 million reward for information leading to the arrest
5BountyHackerMillionRussianSets
Read more
  • Published in Attacks
1 Comment

Why Multifactor Authentication Is Now a Hacker Target

Wednesday, 20 November 2019 by Top Cyber News
SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI. The growing adoption of multifactor authentication (MFA) has resulted in a proportionate rise in cyberattacks that target MFA technologies. In a recent Private Industry Notification (PIN), the Federal Bureau of Investigation (FBI) recognized how recent
authenticationHackermultifactorTarget
Read more
  • Published in Attacks
8 Comments

This 12-course bundle will teach you how to be an ethical hacker for $39

Monday, 04 November 2019 by Top Cyber News
It seems like there’s a new data breach every month, and as hackers ramp up their efforts to steal our private info, it’s only natural to feel afraid. What can you do to fight back? Oddly enough, the best way to prevent cybersecurity attacks is by fighting fire with fire. As an ethical hacker, you
12course39BundleethicalHackerTeach
Read more
  • Published in Strategies
1 Comment

Suspected Hacker Group Creates Network of Fake LinkedIn Profiles

Sunday, 20 October 2019 by Top Cyber News
Author: Dell SecureWorks Counter Threat Unit™ Threat Intelligence Date: 07 October 2015 Summary While tracking a suspected Iran-based threat group known as Threat Group-2889[1] (TG-2889), Dell SecureWorks Counter Threat Unit™ (CTU) researchers uncovered a network of fake LinkedIn profiles. These convincing profiles form a self-referenced network of seemingly established LinkedIn users. CTU researchers assess with
CreatesFakeGroupHackerLinkedInNetworkProfilesSuspected
Read more
  • Published in Threats, Threats Analysis
1 Comment

How to Think Like a Hacker

Friday, 11 October 2019 by Top Cyber News
In the arms race of computer security, it’s never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated. Computer security is a very unique field. Unlike other fields in which the challenge is to overcome the scale of a problem or the complexity
Hacker
Read more
  • Published in Threat Defense, Threats
43 Comments

JP Morgan Hacker Pleads Guilty

Tuesday, 24 September 2019 by Top Cyber News
Russian national Andrei Tyurin, who was extradited to the US last year by Georgian officials for allegedly hacking JP Morgan Chase in 2014 as well as several other cyberattacks on US financial and other organizations, now faces sentencing after a guilty plea in US District Court. Tyurin, 35, was involved in a wide-ranging hacking campaign that targeted
GuiltyHackerJPMorganPleads
Read more
  • Published in Attacks
1 Comment

BRONZE BUTLER Hacker Group Targets Japanese Enterprises

Wednesday, 24 July 2019 by Top Cyber News
Summary Secureworks® incident responders and Counter Threat Unit™ (CTU) researchers investigated activities associated with the BRONZE BUTLER (also known as Tick) threat group, which likely originates in the People’s Republic of China (PRC). BRONZE BUTLER’s operations suggest a long-standing intent to exfiltrate intellectual property and other confidential data from Japanese organizations. Intrusions observed by CTU™
BRONZEBUTLEREnterprisesGroupHackerJapaneseTargets
Read more
  • Published in Threats, Threats Analysis
8 Comments

Common Hacker Tool Hit with Hackable Vulnerability

Saturday, 15 June 2019 by Top Cyber News
Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2018-6339PUBLISHED: 2019-06-14 When receiving calls using WhatsApp on Android, a stack allocation failed to properly account for the amount of data being passed in. An off-by-one error meant that data was written beyond the allocated space on the stack. This issue affects WhatsApp for Android starting in version
CommonHackableHackerHitToolVulnerability
Read more
  • Published in Strategies
3,042 Comments

Nation-State Hacker Group Hijacking DNS to Redirect …

Thursday, 18 April 2019 by Top Cyber News
‘Sea Turtle’ group has compromised at least 40 national security organizations in 13 countries so far, Cisco Talos says. A sophisticated state-sponsored hacking group is intercepting and redirecting Web and email traffic of targeted organizations in over a dozen countries in a brazen DNS hijacking campaign that has heightened fears over vulnerabilities in the Internet’s
DNSGroupHackerHijackingNationStateRedirect
Read more
  • Published in Attacks
204 Comments

British Hacker Jailed for Role in Russian Crime Group

Tuesday, 09 April 2019 by Top Cyber News
According to authorities, Zain Qaiser would pose as a legitimate ad broker to buy online advertising unit from pornographic websites. A British hacker who worked for a Russian crime syndicate has been sentenced to six years and five months in jail after a National Crime Agency (UK) investigation. Zain Qaiser was found to have received
BritishCrimeGroupHackerJailedroleRussian
Read more
  • Published in Attacks
42 Comments
  • 1
  • 2

Recent Posts

  • Waking Up to Third-Party Security Risk

    You can’t rely on the words, intentions, ...
  • Intel Issues Fix for ‘Plundervolt’ SGX Flaw

    Researchers were able to extract AES encryption...
  • Trickbot Operators Now Selling Attack Tools to APT …

    North Korea’s Lazarus Group – of So...
  • What it takes to become a CISO

    The position of chief information security offi...
  • 5 Tips for Keeping Your Security Team on Target

    In nearly every security environment, competing...

Flights & Hotel Finder

Archives

  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • July 2014
  • June 2014
  • May 2014
  • July 2013
  • January 2013
  • May 2011

Categories

  • Attacks
  • Cyber Security
  • Malware
  • RESOURCES
  • Strategies
  • Threat Defense
  • Threats
  • Threats Analysis

Mission

We aim to provide you the most recent updates and news on cyber matters in this digital world.

Reach us via: [email protected]

© 2018. All rights reserved by Top Cyber News.
Creative Commons License

TOP