Tag #Hacking

forbes.com
🌐 90% Global Worthiness
News related image

Sophisticated AI-Powered Gmail Phishing Attack Reported

On January 30th, 2025, a sophisticated AI-driven phishing attack targeting Gmail users was reported, using realistic voice impersonations, spoofed Google numbers, and emails from a legitimate Google domain to trick victims into revealing account reset codes. Google has suspended the malicious accoun...

Progress

44% Bias Score

Peace, Justice, and Strong Institutions
forbes.com
🌐 90% Global Worthiness
News related image

FBI Warning: North Korean IT Workers Steal Data from US Businesses

The FBI warns of North Korean IT workers using unlawful system access to steal data from US businesses; victims faced data ransom, code theft, and credential harvesting; mitigation advice includes disabling local admin accounts and implementing strict identity verification.

Progress

52% Bias Score

Reduced Inequality
forbes.com
🌐 85% Global Worthiness
News related image

Weak Passwords Fuel Millions of Attacks in 2024

An analysis of 2024's worst passwords reveals that "password", "qwerty123", and "123456" were used millions of times in attacks, highlighting the urgent need for stronger passwords and prompting recommendations for improved security practices, including the adoption of passkeys.

Progress

44% Bias Score

Reduced Inequality
theguardian.com
🌐 90% Global Worthiness
News related image

Star Blizzard Uses WhatsApp QR Code Phishing to Target Government Officials

Russian state-linked hackers, Star Blizzard, used phishing emails with QR codes to target WhatsApp accounts of government officials worldwide, aiming to undermine trust in politics and exfiltrate data.

Progress

12% Bias Score

Peace, Justice, and Strong Institutions
repubblica.it
🌐 85% Global Worthiness
News related image

Coordinated Cyberattack Disrupts Italian Banks and Infrastructure

Pro-Russian hackers NoName057(16), collaborating with pro-Palestinian group Alixsec, launched a DDoS attack on Italian banks, water companies, ports, and businesses, including Intesa San Paolo, causing service disruptions and highlighting the escalating threat of coordinated cyberattacks.

Progress

36% Bias Score

Industry, Innovation, and Infrastructure
forbes.com
🌐 90% Global Worthiness
News related image

Hackers Exploit Google Search to Distribute Malicious Chrome Extensions

Hackers manipulate Google's Chrome Web Store search to promote malicious extensions using multilingual keyword stuffing and deceptive name variations, potentially exposing hundreds of millions of users to data theft and 2FA bypass.

Progress

28% Bias Score

Quality Education
welt.de
🌐 90% Global Worthiness
News related image

International Crackdown Shuts Down Major Cybercrime Forums

German and international authorities shut down the cybercrime forums nulled.to and cracked.io, arresting eight individuals, seizing 67 devices and assets worth a mid-six-figure sum, and disrupting associated payment and hosting services.

Progress

44% Bias Score

Peace, Justice, and Strong Institutions
forbes.com
🌐 85% Global Worthiness
News related image

Hackers Target Novice Hackers in Global Malware Attack

A trojanized malware builder, targeting novice hackers, compromised over 18,000 devices globally via GitHub, Telegram, and file-sharing platforms, highlighting conflict within the hacking community and the evolution of cybercriminal tactics.

Progress

32% Bias Score

Peace, Justice, and Strong Institutions
cnn.com
🌐 90% Global Worthiness
News related image

US Sanctions Chinese Entities for Cyberattacks Targeting Top Officials

The Biden administration imposed sanctions on a Chinese tech firm and an individual for allegedly orchestrating cyberattacks that targeted US telecommunication companies and the Treasury Department, compromising sensitive information belonging to senior US officials, including President-elect Trump ...

Progress

40% Bias Score

Peace, Justice, and Strong Institutions
forbes.com
🌐 85% Global Worthiness
News related image

iPhone 15 USB-C Controller Hack: Security Researchers Reveal Vulnerability

Security researcher Thomas Roth bypassed Apple's iPhone 15 ACE3 USB-C controller security, achieving code execution and firmware extraction; experts warn this could lead to future vulnerabilities, although Android users remain unaffected.

Progress

48% Bias Score

No Poverty
forbes.com
🌐 75% Global Worthiness
News related image

Sex Toy Hacking Risk: UK Government Warns of Physical and Psychological Harm

A UK government-commissioned report highlights the risk of hacking Bluetooth-enabled sex toys, warning of potential physical (e.g., overheating, remote locking) and psychological (data breaches) harm due to unencrypted connections and insecure APIs.

Progress

56% Bias Score

Good Health and Well-being
dw.com
🌐 90% Global Worthiness
News related image

Alleged Rosreestr Data Breach Raises Concerns in Russia

Hackers claim a 2 billion record data breach from Russia's Rosreestr, partially verified by a news outlet; Rosreestr denies the breach but is investigating, raising concerns about data security and access restrictions implemented in 2022 and 2023.

Progress

36% Bias Score

Peace, Justice, and Strong Institutions