Security Awareness Training Blog

Hacking Blog

Hacking news about techniques cyberriminals use, how they (sometimes) get caught, the organizations that have been hacked and how it impacts their business.

Hacker's Movie Guide: The Complete List of Hacker and Cybersecurity Movies

Is alert fatigue getting to you? I found a guide that allows you some well-deserved personal downtime, and still has something to do with work so that you can justify getting away with ...
Continue Reading

[On-Demand Webinar] Hacking Biometrics: If You Thought Your Fingerprints Were Safe, Think Again!

When you think of using biometric technology as part of your multi-factor authentication process, you assume these attributes are safe. Cybercriminals can’t hack your fingerprints, can ...
Continue Reading

[On-Demand Webinar] When Cybercriminals Hide in Plain Sight: Hacking Platforms You Know and Trust

Today’s hackers are concealing their attacks in places you wouldn’t expect… utilizing tools your users know and trust to deliver their malicious payloads. From hijacked single sign-on ...
Continue Reading

[Heads Up] The Bad Guys Have Likely Hacked Your Exchange Email Server

What if Chinese state-sponsored hackers have owned your OWA using several brand-new zero-day vulns? Or Eastern Europe ransomware gangs?  On March 2, Microsoft released emergency security ...
Continue Reading

Someone Hacked The Four Top Russian Cybercrime Forums In One Month

Intrepid investigative cyber security reporter Brian Krebs has some interesting news. He said: "Over the past few weeks, three of the longest running and most venerated Russian-language ...
Continue Reading

The First Documented Russian Hack in...1981?

I'm reading "Active Measures: The Secret History of Disinformation and Political Warfare" by Thomas Rid and wanted to share this story with you which was new to me! It's warmly ...
Continue Reading

Bahrain’s National Oil Company Hit by Iranian "DustMan" Data Wiper

The Bahrain National Oil Company was attacked by Iranian state-sponsored hackers implanting a destructive data wiper nicknamed "DustMan." 
Continue Reading

Half of M&A Cyber Audits Uncover Undisclosed Breaches That Derail Deals

Cybersecurity diligence performed prior to a merger or acquisition often uncovers weaknesses in an organization’s security stance, which can spell doom for the company being purchased and ...
Continue Reading

SIM Card Attack May Affect Over 1 Billion Mobile Phones Worldwide

Using SMS messaging, attackers can use phishing tactics to hijack mobile devices using a legacy piece of SIM code, called the S@T Browser, to execute commands as part of a more ...
Continue Reading

Reuters: "Hackers hit UK political parties with back-to-back cyberattacks"

LONDON (Reuters) - Hackers hit Britain’s two main political parties with back-to-back cyberattacks on Tuesday, sources told Reuters, attempting to force political websites offline with a ...
Continue Reading

China's Criminal Hacking Spree Created A Boeing Competitor

Crowdstrike just released an explosive report which details the lengths China went to narrow the gap of the technological delta between them and market leaders like Boeing and Airbus. 
Continue Reading

Why Hack When You Can Con?

 
Continue Reading

Brand-New: Multi-Factor Authentication Security Assessment Tool Helps Assess Your Organization's MFA Vulnerabilities

You already know that using multi-factor authentication (MFA) can decrease your cybersecurity risk, and certainly is a much stronger defense compared to using traditional passwords alone. ...
Continue Reading

Chinese Hackers Target Airbus Suppliers in Quest for Commercial Secrets

European aerospace giant Airbus has been hit by a series of attacks by hackers targeting its suppliers in search of commercial secrets, sources told AFP, adding they suspected a Chinese ...
Continue Reading

WSJ: "U.S. Targets North Korean Hacking as Rising National-Security Threat"

Ian Talley and Dustin Volz at the WSJ wrote:
Continue Reading

Ethical Hackers as Educators

Ethical hackers are especially well-positioned to use their knowledge of attack techniques to educate people, according to Zoë Rose, a white-hat hacker based in the UK. On the CyberWire’s ...
Continue Reading

OSINT – a Hacker’s First Asset in Targeted Attacks

Before a cybercriminal wants to engage in a targeted attack against a particular organization or individual, they’d like to know a few things first. That’s where OSINT comes into play.
Continue Reading

Hackers Exfiltrate 7.5TB From Russian FSB Contractor

'Biggest ever breach' exposes project to de-anonymize Tor traffic. IF YOU'RE A CONTRACTOR to a government intelligence service, then getting hacked is a really bad look. Especially if the ...
Continue Reading

"YouTube mystery ban on hacking videos has content creators puzzled"

That was the title of the always entertaining The Register's post about YouTube, under fire since inception for building a business on other people's copyrights and in recent years for ...
Continue Reading

Biometrics Can’t Replace Passwords: A Cybercriminal's Dream

In the quest to create a more secure environment, new ways to authenticate that replace the password are being sought. But it’s looking like passwords are here to stay.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews