hack,hacker,hacker news,cybersecurity,penetration testing, hackerspace, cyberwar, cybercrime

Border Cyber Group Security Gladiators Maltronics Hacker Gear hackersploit Crypto Anarchy Wiki Crypto Anarchy Telecomix Corelan Security Bruce Schneir Security Affairs Obey FilFar ippsec hackthebox hackertarget seytonic crypto hudson phrack shevirah georgia skillset pentestlab eagleeye kodachi tor qubes tryhackme vmware synergetic-web-group kali offensive w3schools github |\|070r|0u5 stackoverflow hackercombat stackexchange speedguide hacktricks bluewalle defuse cybermentor virustotal crackstation

SELECTIONS FROM TOP CYBERSECURITY NEWS SOURCES

Extensive Portal for NSO Group Malware Research

Linux Kernel Vulnerability Threatens Systems Across the Linux Landscape - Dark Reading

Chinese APT Group Has Been Hacking Cisco Edge Routers for Over 10 Years With Corrupted Firmware - Dark Reading

2022 LastPass Breach Leads to Millions in Crypto Thefts - Krebs on Security

Vicious Hacktivist Publishes Stolen Airbus Data and Threatens Arms Industry Giants - Krebs on Security

Adobe, Apple, Google and Microsoft Reveal Zero-day and Zero-click Vulnerabilities - Krebs on Security

EU unveils "revolutionary" laws to curb deceptive powers of big tech - The Guardian

Spyware Vendor Hacked - Schneier on Security

Google warns of novel social engineering method used to hack security researchers - The Verge

NSA and FBI: Kimsuky hackers pose as journalists to steal intel - Bleeping Computer

Hackers have breached organizations in defense and other sensitive sectors, security firm says - CNN

Meta disrupted two influence campaigns from China and Russia - Security Affairs

Blinking Red Light of Death for Surveillance Cameras - Hacker Combat

China-linked hackers used VPN flaw to target U.S. defense industry -researchers - Reuters

Iran-linked hackers used fake Atlantic Council-affiliated persona to target human rights researchers - Cyberscoop

U.S. anti-hacking laws pose a risk to national security

Recent legal developments bode well for security researchers, but challenges remain - CS Online

Ethical hackers and the economics of security research - Help Net Security

Getting Online (Or NOT) in North Korea

The Impregnability of the Piratebay Fortress

Wolfgang Brings US the "Perfect" Home Server Configuration..

India Hosting Extensive Secret Hacking-for-Hire Industry

What's Up with ChatGPT's Conversation History Feature: Privacy Breach!!

Russian Spy Network Dismantled by Polish Security

Critical (Nuclear) U.S. Infrastructure Targeted by Russia-Linked APT Group in 2022

Your Phone Is My Bitch... Low Level, High Impact ARM Chip Vulnerabilities Discovered On Qualcomm Snapdragon ARM-Based Subsystems

Five Guys H.R. Data Breach Highlights Dangers To Job Applicants. Company Faces Lawsuits.

ChatGPT - AI That Can Write Malware (And Just About Anything Else...On Demand!)

FBI Email Servers Hacked: Fake Malware Warnings Widely Distributed to Government and Industry

Russian APT Groups Infiltrate U.S. Defense Contractors

Chinese APT Groups Infiltrate U.S. Defense Contractors

Are We FINALLY Gonna Be Rid of the Plague of Facebook? Meta Stocks PLUMMET

The Latest in Russia/Ukraine Cyber War - NATO-designed Command and Control Servers Targeted

The Pegasus Project: The Guardian and Washington Post Surveilling Israeli Surveillance Malware

Government sourced spyware targeting Android mobile devices to permit extensive access to private resources and data on cell phones...

Trickbot Leveraging Reputations of Major Brands

NSA Mass Surveillance Undermines the Security of the United States, at Great Cost

Federal Secure-Identiry Cards Foiled by Personal Reader Devices Infected with Malware

Log4j vulnerability alive and well on VMWare Horizon Servers - North Korean Hackers Getting Inside!

Conti CyberCrime Gang Responds to REvil Takedown

Russian "Conti" (now under old name "Ryuk") Ransomware Group's Impact on U.S. Healthcare

Timeline Review of the Ukraine-Russia Cyber-conflict

Massive Russian Pipeline Company Breach

Satellite System Hack Spills Across Europe

Hack Russia Now

Banking Trojan Targets Official AppStores to Gain Access Even to 2-Factor Authentication Tokens!

Classic Email/Copycat Webpage Hack Demonstrates Power of Phishing to Enable Major Theft/Loss of Property

India Anti-Hacktivist Group Plants False Evidence Leading to Arrests

Apple Hands All User Data and Control of Data Centers in China to the CCP

Malicious Python packages Found in the PyPI Repo

Linux Kernel Z-Day Vulnerability Reported

Initial Access Market is Booming for Critical Shipping Infrastructure

Trojan Source Bug Threatens Security of ALL CODE...

Russia's Nobelium APT Group Continues to Target Critical Global Supply Chain Actors

Entire Twitch Website Hacked and Displayed: Phase One

Cloudflare Gives a Detailed Accounting of the Facebook Network Outage

Facebook, WhatsApp, and Instagram are down worldwide, it’s panic online

Stuxnet-Like Viruses Remain a Top U.S. Security Risk

Another Zero Day Exposes Countless Microsoft Business Customers to Targeted Attacks

Industrial Switches from different Vendors Impaired by Similar Exposures

Al Jazeera Hunts Bangladeshi Criminals Using Their Own Israeli-purchased Spyware

North Korea Linked Konny Rat Updated Malware Aimed at Russian Targets

Another Ransomeware Gang Goes Down, Releasing Private Decryption Keys...

Supply Chain Attacks Destined to Escalate

Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years

Researchers Discover Android Surveillance Malware Built by U.S. Sanctioned Russian Firm

HTTP-Botnets: The Dark Side of a Standard Protocol!

Skynet, a Tor-powered botnet straight from Reddit

REvil Ransomware Gang Disappears from Internet

AMLBot - AML program to check crypto wallets for illicit funds

Experts Shed Light On New Russian Malware-as-a-Service Written in Rust

Ficker Infostealer Malware

Hackers Obfuscating Payloads With Exotic Programming Languages

Malware developers turn to 'exotic' programming languages to thwart researchers

Dark Web Tool That Checked For Dirty Bitcoin Shuts Down

Cybercriminals Have Built Their Own Blockchain Analytics Tool

The NSA's Plan to own the Internet

Ass Hacking: An Emerging International Cybersecurity Crisis

Op Ed on Apple's New Mass Surveillance System and It's (Supposedly) Unintended Uses

Tripwire Analyzes US Pipeline Security Issues

Exposure of Thousands of Supply Chain Networks to Hackers is Likely On the Horizon

Microsoft Exchange Server flaws inspire 30,000-plus Cyber Attacks

Government Assessment of Solar Winds Breach

FireEye Discovers Solar Winds Breach While Researching Internal Compromised Systems

Microsoft Scrutinized for Role in Solar Winds Breach

Zero Logon Vulnerability Exposes Windows Domain Controllers to Ransomware Attacks

Cyberattacks Targeting Triconex Industrial Control Systems' Legacy Flaws - Private Critical Infrastructure Response Weak - Warns NSA, Homeland Security

All the Ways Your Wi-Fi Router Can Spy on You

Digital Shadows Weekly Podcast Roundup Discusses Ransomware Landscape

Understanding NIST SP 800-207 - Zero Trust Security Architecture for Industrial Control Settings

International Maritime Organization Hacked

Wordpress Flaw Leverages Zerologon to attack Domain Controllers

HEH Botnet Wipes/Bricks Devices

Kraken Fileless Attack Exploits Windows Error Reporting

Attack of the Coffee Makers... lol

Chinese hackers have stolen information from Spanish laboratories working on a vaccine for COVID19, El Pais newspaper revealed

US DoJ charges Iranian hackers for attacks on US satellite companies

Russian Actors Use Fake N.A.T.O. Credentials to Hack Foreign Governments

Brighter Bulbs on the Amazon Christmas Tree - Drivers Hacking Trees for Better Routes

Who's Watching YOUR Six? Cryptocurrency Fraud By Russian Hackers..

What's the Fight Really About? U.S. Economic Warfare and Likely Foreign Defenses

The Real Scoop on Five Eyes, Nine Eyes, and 14 Eyes Surveillance Alliances

California Court Issues Chilling Ruling Concerning CFAA (Computer Fraud and Abuse Act)

Are VPN's Lying About Logs?

Homeland Security Spying on Journalists Reporting on Portland Protests

Threat Intel Feed Summary from Digital Shadows

Digital Shadows Reviews Threat Model of the Remote Worker

Zero Trust - My Paradigm Exactly - U.S. Navy Finally Graduates to the Pros

Another Zero-Day from hacktress sandboxescaper!!

Hackers Weaponizing AI

US Cyberconference AI Malware Discussion

AI Malware Considered

Business Bigwigs Fear Hackers with AI Tools

AI Malware with Superpowers...lol

LATEST NEWS ON JULIAN ASSANGE FROM BRITAIN'S "Independent"

Excellent Review of Current State of Cyberwarfare

Japanese Cybercrime Underground On The Rise

OOOhhh.... Hexane Moves In for the Big Kill...

Captital One Data Breach...Unknown if This Data Was Actually Leaked!

Court Blabs About NSA Hacking of Foreign Governments... Then Jails Contractor for Hacking NSA

Wired Magazine takes a look at Hacker Group APT32, aka OceanLotus

Trump Orders Cyberattack Against Iranian Missile Sites

Triada Backdoor to Root Control Built Into Android Devices at Factories

Hacker GnosticPlayers: Passwords for Sale

Hackers Get Hacked! (It's About Time....)

Assange Charged in U.S.

Intezer Gets The Scoop on Hidden Wasp Linux Malware

Germany Demands an End to Working Cryptography

China APT Activity Review from US-CERT.gov

Great Scholarly Contribution from bunnie and Ed (Snowden) on Hardware Vulnerability Mitigation

Thangrycat Harware Vulnerability Compromises Cisco Trustchain at it's Root

SeedWorm APT fortifies BlackWater phishing campaign with clever anti-detection methods

Israel Responds to Hamas Cyber Attack with Lethal Military Force

(YOUR) Instagram Private Data Dumped on Public Database

Stack OVerflow's Production Servers Hacked!

Operation ShadowHammer

Mystery Hackers Hit MegaRich Corporations

China-linked Cyber Espionage Group Targets Naval Adversaries

Israeli Prime Minister Lead Challenging Candidate Hacked By Iranian Intelligence

SimBad Malware Spreading Via Google Play Store

NSA Hacks American Router Hardware

NSA's "Boundless Informant"

Thomas Drake Comments on PRISM

Der Speigel: NSA mass surveillance of German citizens

Researchers at Microsoft warn of damages caused by cyber operations conducted by Iran-linked cyberespionage groups.

Modular Cryptojacking malware uses worm abilities to spread