Tag: breaches

  • Hacker News: U.S. Army Soldier Arrested in AT&T, Verizon Extortions

    Source URL: https://krebsonsecurity.com/2024/12/u-s-army-soldier-arrested-in-att-verizon-extortions/ Source: Hacker News Title: U.S. Army Soldier Arrested in AT&T, Verizon Extortions Feedly Summary: Comments AI Summary and Description: Yes Summary: A U.S. Army soldier, Cameron John Wagenius, has been arrested for allegedly hacking and leaking sensitive telecom data. His arrest highlights a concerning trend of military personnel becoming involved in cybercriminal…

  • Krebs on Security: U.S. Army Soldier Arrested in AT&T, Verizon Extortions

    Source URL: https://krebsonsecurity.com/2024/12/u-s-army-soldier-arrested-in-att-verizon-extortions/ Source: Krebs on Security Title: U.S. Army Soldier Arrested in AT&T, Verizon Extortions Feedly Summary: Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As…

  • Hacker News: Apache fixes Traffic Control bug that attackers could exploit

    Source URL: https://www.scworld.com/news/apache-fixes-traffic-control-bug-that-attackers-could-exploit Source: Hacker News Title: Apache fixes Traffic Control bug that attackers could exploit Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a critical vulnerability in Apache Traffic Control, specifically the Traffic Ops component, which is rated 9.9 on the CVSS scale. This SQL injection vulnerability enables privileged attackers…

  • Hacker News: Breaking NATO Radio Encryption [video]

    Source URL: https://media.ccc.de/v/38c3-breaking-nato-radio-encryption Source: Hacker News Title: Breaking NATO Radio Encryption Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses significant vulnerabilities in the HALFLOOP-24 encryption algorithm utilized by the US military and NATO for high-frequency radio communication. It reveals that the encryption can be compromised within two hours of intercepted traffic…

  • The Register: It’s only a matter of time before LLMs jump start supply-chain attacks

    Source URL: https://www.theregister.com/2024/12/29/llm_supply_chain_attacks/ Source: The Register Title: It’s only a matter of time before LLMs jump start supply-chain attacks Feedly Summary: ‘The greatest concern is with spear phishing and social engineering’ Interview Now that criminals have realized there’s no need to train their own LLMs for any nefarious purposes – it’s much cheaper and easier…

  • The Register: How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise

    Source URL: https://www.theregister.com/2024/12/28/lockbit_alphv_disruptions_ransomhub_rise/ Source: The Register Title: How cops taking down LockBit, ALPHV led to RansomHub’s meteoric rise Feedly Summary: Cut off one head, two more grow back in its place RansomHub, the ransomware collective that emerged earlier this year, quickly gained momentum, outpacing its criminal colleagues and hitting its victims especially hard. The group…

  • Slashdot: Massive VW Data Leak Exposed 800,000 EV Owners’ Movements

    Source URL: https://yro.slashdot.org/story/24/12/27/2256234/massive-vw-data-leak-exposed-800000-ev-owners-movements?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Massive VW Data Leak Exposed 800,000 EV Owners’ Movements Feedly Summary: AI Summary and Description: Yes Summary: The incident involving the VW Group’s inadequate data security highlights significant vulnerabilities in automotive cloud services, exposing sensitive user information for hundreds of thousands of vehicles. This lapse presents critical insights for…