
RECENT ARTICLES

The Record by Recorded Future
September 21, 2022Anonymous hackers have claimed to be behind attacks on several websites affiliated with the Iranian government amid protests following the death of 22-year-old Mahsa Amini.Several websites, including for the central bank and the national government portal and state-owned media sites, have been intermittently unreachable.Some hacktivist accounts have claimed to have conducted destructive attacks on these government websites, including deleting databases associated with the site for the government spokesperson, although no evidence has been provided for those claims.Amini —...…September 21, 2022Anonymous hackers have claimed to be behind attacks on several websites affiliated with the Iranian government amid protests following the death of 22-year-old Mahsa Amini.Several websites, including for the central bank and the national government portal and state-owned media sites, have been intermittently unreachable.Some hacktivist accounts have claimed to have conducted destructive attacks on these government websites, including deleting databases associated with the site for the government spokesperson, although no evidence has been provided for those claims.Amini —...WW…

The Record by Recorded Future
September 20, 2022Hackers are abusing Google’s Tag Manager (GTM) containers to install malicious e-skimmers that steal payment card data and personally identifiable information of shoppers on e-commerce sites, according to a from Recorded Future.Thousands of e-commerce sites use Google Tag Manager containers for data on website usage metrics, customer tracking and marketing purposes. But Recorded Future experts have found three significant variants of malicious scripts that cybercriminals are hiding within GTM containers that allow them to exfiltrate the personal information of...…September 20, 2022Hackers are abusing Google’s Tag Manager (GTM) containers to install malicious e-skimmers that steal payment card data and personally identifiable information of shoppers on e-commerce sites, according to a from Recorded Future.Thousands of e-commerce sites use Google Tag Manager containers for data on website usage metrics, customer tracking and marketing purposes. But Recorded Future experts have found three significant variants of malicious scripts that cybercriminals are hiding within GTM containers that allow them to exfiltrate the personal information of...WW…

The Record by Recorded Future
May 27, 2022Russian cybercrime forums are teeming with the network credentials and virtual private network accesses of employees from U.S. colleges and universities, according to from the FBI. This week, the FBI said U.S. college and university credentials are being advertised widely across cybercrime forums. In May 2021, the FBI says it found more than 36,000 email and password combinations for email accounts ending in .edu publicly available on instant messaging platforms frequented by cybercriminals. According to the FBI, most of the credentials stem from spear-phishing,...…May 27, 2022Russian cybercrime forums are teeming with the network credentials and virtual private network accesses of employees from U.S. colleges and universities, according to from the FBI. This week, the FBI said U.S. college and university credentials are being advertised widely across cybercrime forums. In May 2021, the FBI says it found more than 36,000 email and password combinations for email accounts ending in .edu publicly available on instant messaging platforms frequented by cybercriminals. According to the FBI, most of the credentials stem from spear-phishing,...WW…

The Record by Recorded Future
September 20, 2022If you ask ‘Yuki’ why he helped found a channel on Telegram to facilitate the settling of scores in the mobile phone hacking community, he says it was about supply and demand. Lots of young SIM swappers were looking for a way to get back at enemies in the real world.SIM swapping at its most basic level entails someone hijacking your mobile phone. They swap your SIM card and all the information on it for a SIM card they own – and just like that they have access to your passwords, your emails, and the two-factor authentication codes that protect bank accounts and...…September 20, 2022If you ask ‘Yuki’ why he helped found a channel on Telegram to facilitate the settling of scores in the mobile phone hacking community, he says it was about supply and demand. Lots of young SIM swappers were looking for a way to get back at enemies in the real world.SIM swapping at its most basic level entails someone hijacking your mobile phone. They swap your SIM card and all the information on it for a SIM card they own – and just like that they have access to your passwords, your emails, and the two-factor authentication codes that protect bank accounts and...WW…

The Record by Recorded Future
September 28, 2022When the world’s top-rated chess player, Magnus Carlsen, lost in the third round of the Sinquefield Cup earlier this month, it rocked the elite chess world.The tournament was held in St. Louis, and Carlsen, one of the biggest names in chess since Bobby Fischer, faced 19-year-old Hans Niemann, a confident, shaggy-haired American. Over the course of 57 moves, Niemann whittled his Norwegian opponent down to just his king and a bishop, before the five-time world champion resigned the match. But what followed was even more shocking: Carlsen quit the whole tournament, then...…September 28, 2022When the world’s top-rated chess player, Magnus Carlsen, lost in the third round of the Sinquefield Cup earlier this month, it rocked the elite chess world.The tournament was held in St. Louis, and Carlsen, one of the biggest names in chess since Bobby Fischer, faced 19-year-old Hans Niemann, a confident, shaggy-haired American. Over the course of 57 moves, Niemann whittled his Norwegian opponent down to just his king and a bishop, before the five-time world champion resigned the match. But what followed was even more shocking: Carlsen quit the whole tournament, then...WW…

The Record by Recorded Future
September 29, 2022White hat hackers uncovered almost 350 vulnerabilities inside the Defense Department’s networks during a week-long bug bounty program held earlier this year, according to the initiative’s organizers.Nearly 270 researchers participated in the effort, , which offered financial rewards for sniffing out critical- and high-level vulnerabilities in systems operated by the Pentagon. Competitors submitted 648 reports, within the scope of the , to bug bounty platform HackerOne and the department agencies overseeing the pilot program between July 4 and July 11. Of those, 349...…September 29, 2022White hat hackers uncovered almost 350 vulnerabilities inside the Defense Department’s networks during a week-long bug bounty program held earlier this year, according to the initiative’s organizers.Nearly 270 researchers participated in the effort, , which offered financial rewards for sniffing out critical- and high-level vulnerabilities in systems operated by the Pentagon. Competitors submitted 648 reports, within the scope of the , to bug bounty platform HackerOne and the department agencies overseeing the pilot program between July 4 and July 11. Of those, 349...WW…

The Record by Recorded Future
September 29, 2022The head of the Finnish Security Intelligence Service (Suojelupoliisi or SUPO) says it is “highly likely that Russia will turn to the cyber environment over the winter” for espionage due to challenges impacting its human intelligence work.In the unclassified published on Thursday, SUPO said that Russia’s traditional intelligence gathering approach using spies with diplomatic cover “has become substantially more difficult since Russia launched its war of aggression in Ukraine, as many Russian diplomats have been expelled from the West.”The agency acknowledged that there are...…September 29, 2022The head of the Finnish Security Intelligence Service (Suojelupoliisi or SUPO) says it is “highly likely that Russia will turn to the cyber environment over the winter” for espionage due to challenges impacting its human intelligence work.In the unclassified published on Thursday, SUPO said that Russia’s traditional intelligence gathering approach using spies with diplomatic cover “has become substantially more difficult since Russia launched its war of aggression in Ukraine, as many Russian diplomats have been expelled from the West.”The agency acknowledged that there are...WW…

The Record by Recorded Future
September 29, 2022A 30-year-old former National Security Agency (NSA) employee was charged in federal court on Thursday with attempting to sell sensitive information related to national cyber operations to a foreign government representative.Jareh Dalke worked as an Information Systems Security Designer at the NSA for less than a month this summer before he allegedly offered to sell classified documents to a person he thought was working for a foreign government.According to a Department of Justice release, he began sending excerpts of stolen classified information from an encrypted email...…September 29, 2022A 30-year-old former National Security Agency (NSA) employee was charged in federal court on Thursday with attempting to sell sensitive information related to national cyber operations to a foreign government representative.Jareh Dalke worked as an Information Systems Security Designer at the NSA for less than a month this summer before he allegedly offered to sell classified documents to a person he thought was working for a foreign government.According to a Department of Justice release, he began sending excerpts of stolen classified information from an encrypted email...WW…

The Record by Recorded Future
September 28, 2022Russia’s physical invasion of Ukraine has been accompanied by “probably the most sustained and intensive cyber campaign on record” according to one of the United Kingdom’s most senior cybersecurity officials.Lindy Cameron, the chief executive of the National Cyber Security Centre (NCSC), told the Chatham House on Wednesday that her agency had “not been surprised by the volume of Russian offensive cyber operations, nor have we been surprised by their targeting.”Even before NCSC was founded in 2016, its parent organization had spent decades studying Russian cyber doctrine...…September 28, 2022Russia’s physical invasion of Ukraine has been accompanied by “probably the most sustained and intensive cyber campaign on record” according to one of the United Kingdom’s most senior cybersecurity officials.Lindy Cameron, the chief executive of the National Cyber Security Centre (NCSC), told the Chatham House on Wednesday that her agency had “not been surprised by the volume of Russian offensive cyber operations, nor have we been surprised by their targeting.”Even before NCSC was founded in 2016, its parent organization had spent decades studying Russian cyber doctrine...WW…

The Record by Recorded Future
September 28, 2022The Senate Homeland Security Committee on Wednesday easily approved legislation to better secure open-source software.The panel okayed the legislation, dubbed the , by voice vote as part of an en bloc package of bills during a business meeting. Approval came a week after committee leaders Gary Peters (D-Mich.) and ranking member Rob Portman (R-Ohio) .The bill was prompted by the widespread Log4j vulnerability. The flaw was discovered late last year and sent the private sector, as well as governments around the globe, scrambling to secure their networks before the...…September 28, 2022The Senate Homeland Security Committee on Wednesday easily approved legislation to better secure open-source software.The panel okayed the legislation, dubbed the , by voice vote as part of an en bloc package of bills during a business meeting. Approval came a week after committee leaders Gary Peters (D-Mich.) and ranking member Rob Portman (R-Ohio) .The bill was prompted by the widespread Log4j vulnerability. The flaw was discovered late last year and sent the private sector, as well as governments around the globe, scrambling to secure their networks before the...WW…
- Total 10 items
- 1
