"French Hacker From 'ShinyHunters' Group Sentenced to Three Years in US Prison"

"French Hacker From 'ShinyHunters' Group Sentenced to Three Years in US Prison"

Sebastien Raoult, also known as "Sezyo Kaizen," a 22-year-old Frenchman, has been sentenced to three years in US federal prison for participating in the ShinyHunters hacking group. Raoult and two co-conspirators hacked over 60 companies and posted stolen data on dark web forums such as RaidForums, EmpireMarket, and Exploit. They sometimes threatened to leak data if a ransom was not paid. ShinyHunters targeted well-known entities in 2020 and 2021, including the clothing retailer Bonobos, the photo app Pixlr, and Microsoft's GitHub account.

Submitted by Gregory Rigby on

"API Use Increases Significantly, but Poses Greater Risks"

"API Use Increases Significantly, but Poses Greater Risks"

According to Cloudflare researchers, the use of Application Programming Interfaces (APIs) is increasing but poses greater management and security risks. APIs generated about 57 percent of global dynamic Internet traffic in 2023. However, the increased API traffic causes additional management and security issues, especially as there are more API endpoints than companies reported. The researchers discovered up to 30.7 percent more API endpoints than specified. These "Shadow APIs" are often used by developers or individual end users to run specific business applications.

Submitted by Gregory Rigby on

"Threat Actors Hacked the X Account of the Securities and Exchange Commission (SEC) and Announced Fake Bitcoin ETF Approval"

"Threat Actors Hacked the X Account of the Securities and Exchange Commission (SEC) and Announced Fake Bitcoin ETF Approval"

Hackers took over the US Securities and Exchange Commission's (SEC) X account and used it to spread false information regarding the approval of Bitcoin ETFs on security exchanges. According to the now-removed message, the SEC granted approval to Bitcoin ETFs for listing on registered national security exchanges. The news immediately impacted the cryptocurrency industry, with Bitcoin briefly reaching $48,000 before dropping to around $45,000 following the SEC's denial.

Submitted by Gregory Rigby on

"Hospitality Hackers Target Hotels' Booking.com Logins"

"Hospitality Hackers Target Hotels' Booking.com Logins"

Cybercriminals are targeting hotels' backend Booking.com logins in order to take over the accounts and eventually harvest data on the hotels' customers. According to Perception Point's analysis of the campaign, threat actors are changing their tactics by focusing on specific industry practices and relationships to conduct targeted and convincing phishing attacks. Many of the phishing messages are addressed to hotel managers, claiming that former guests are leaving harsh reviews of the property online. The emails encourage hotels to sign in and respond to the complaints.

Submitted by Gregory Rigby on

"Top LLM Vulnerabilities and How to Mitigate the Associated Risk"

"Top LLM Vulnerabilities and How to Mitigate the Associated Risk"

Exploring Artificial Intelligence (AI) is critical for remaining competitive, so CISOs must understand and address emerging AI threats. Large Language Model (LLM) vulnerabilities pose a significant threat to enterprise operations. It is essential for cyber teams to understand these vulnerabilities and how to mitigate them so enterprises can continue to innovate with LLMs without putting themselves at risk. This article continues to discuss the top LLM vulnerabilities and suggestions for mitigating them.

Submitted by Gregory Rigby on

"HMG Healthcare Says Data Breach Impacts 40 Facilities"

"HMG Healthcare Says Data Breach Impacts 40 Facilities"

Healthcare services provider HMG Healthcare has recently disclosed a data breach impacting the personal health information of employees and residents at 40 affiliated nursing facilities.  The incident was identified in November 2023, but an investigation determined that the data breach occurred in August 2023.  The company noted that the incident involved hackers gaining access to their server and stealing unencrypted files.  Files on the server likely contained medical records and personal information.

Submitted by Adam Ekwall on

"China Claims It Cracked Apple's AirDrop to Find Numbers, Email Addresses"

"China Claims It Cracked Apple's AirDrop to Find Numbers, Email Addresses"

China's Beijing Wangshendongjian Judicial Appraisal Institute claims to have discovered how to decrypt device logs for Apple's AirDrop feature. This operation would allow the government to identify the phone numbers or email addresses of those who have shared content. In order to avoid censorship in the country, people turned to Apple's AirDrop feature. The feature does not require cellular service, sending images between devices via Bluetooth and a private Wi-Fi network. This article continues to discuss the AirDrop cracking claimed by the Chinese state-backed research institute.

Submitted by Gregory Rigby on
Subscribe to