Published on: 2025-06-17 15:46:22
The decentralized exchange Cetus Protocol announced that hackers have stolen $223 million in cryptocurrency and is offering a deal to stop all legal action if the funds are returned. The project also announced a $5 million bounty to anyone providing relevant information leading to the identification and arrest of the attacker. Cetus Protocol is a decentralized exchange (DEX) and liquidity protocol operating on the Sui and Aptos blockchains. It employs a Concentrated Liquidity Market Maker (CL
Keywords: attacker cetus hacker million protocol
Find related items on AmazonPublished on: 2025-06-21 17:21:32
A Russian state-sponsored cyberespionage campaign attributed to APT28 (Fancy Bear/Forest Blizzard) hackers has been targeting and compromising international organizations since 2022 to disrupt aid efforts to Ukraine. The hackers targeted entities in the defense, transportation, IT services, air traffic, and maritime sectors in 12 European countries and the United States. Additionally, the hackers have been tracking the movement of materials into Ukraine by compromising access to private camera
Keywords: access apt28 hackers ukraine used
Find related items on AmazonPublished on: 2025-06-23 01:24:13
In Brief Coinbase said at least 69,461 customers had personal and financial information stolen during a months-long data breach that it disclosed last week. The crypto giant confirmed the number of affected customers in a filing with Maine’s attorney general on Wednesday, as required by the state’s data breach notification law. Coinbase’s filing said the breach dates back to December 26, 2024, and continued until earlier this month, when the company said it received a “credible” ransom note f
Keywords: coinbase customers data hacker said
Find related items on AmazonPublished on: 2025-06-23 01:03:10
In Brief Coinbase said at least 69,461 customers had personal and financial information stolen during a months-long data breach that it disclosed last week. The crypto giant confirmed the number of affected customers in a filing with Maine’s attorney general on Wednesday, as required by the state’s data breach notification law. Coinbase’s filing said the breach dates back to December 26, 2024, and continued until earlier this month, when the company said it received a “credible” ransom note f
Keywords: coinbase customers data hacker said
Find related items on AmazonPublished on: 2025-06-23 13:07:26
Retail hackers believed to be young and from US and UK, detectives say 2 hours ago Share Save Joe Tidy Cyber correspondent, BBC World Service Share Save Getty Images The disruption being caused by the wave of cyber attacks on UK retailers has been apparent for weeks. Empty shelves, cancelled online orders, the data of millions of customers stolen. What has been much less clear is who is responsible, with the companies and authorities only giving limited details. But, now - in their first inte
Keywords: cyber hackers scattered spider uk
Find related items on AmazonPublished on: 2025-06-27 21:00:00
During a recent cabinet meeting, President Donald Trump’s then national security adviser, Mike Waltz, must have been bored. Apparently unaware of the photographer behind him, he was caught clandestinely checking his Signal messages under the table. Only he wasn’t using the official Signal app, which is widely considered to be the gold standard of encrypted messaging apps. He was actually using a clone of Signal called TeleMessage Signal, or TM SGNL. This app, made by TeleMessage (which was rece
Keywords: hacker security signal telemessage used
Find related items on AmazonPublished on: 2025-06-27 20:43:33
A letter from the M&S hackers landed in my inbox - this is what happened next 4 hours ago Share Save Joe Tidy Cyber correspondent Share Save BBC Joe Tidy interacted with hackers who claimed to have done the M&S and Co-op hack Almost daily, my phone pings with messages from hackers of all stripes. The good, the bad, the not-so-sure. I've been reporting on cyber security for more than a decade, so I know that many of them like to talk about their hacks, findings and escapades. About 99% of thes
Keywords: cyber dragonforce hack hackers op
Find related items on AmazonPublished on: 2025-06-28 08:23:10
In Brief Eric Council Jr., 26, was sentenced to 14 months in prison and three years of supervised release on Friday for participating in the hack of the official X account of the U.S. Securities and Exchange Commission. The U.S. Department of Justice announced the sentencing in a press release. Council and other hackers took over the SEC’s X account in 2024 to falsely announce that the agency had approved Bitcoin exchange traded funds, or ETFs, which shot up the price of the cryptocurrency bef
Keywords: account control council hackers sec
Find related items on AmazonPublished on: 2025-07-01 01:14:39
Hackers are running a worldwide cyberespionage campaign dubbed 'RoundPress,' leveraging zero-day and n-day flaws in webmail servers to steal email from high-value government organizations. ESET researchers who uncovered the operation attribute it with medium confidence to the Russian state-sponsored hackers APT28 (aka "Fancy Bear" or "Sednit"). The campaign started in 2023 and continued with the adoption of new exploits in 2024, targeting Roundcube, Horde, MDaemon, and Zimbra. Notable targets
Keywords: email hackers javascript script xss
Find related items on AmazonPublished on: 2025-07-15 20:38:47
A hacker has exploited a vulnerability in TeleMessage to breach the service and steal data, according to reporting by 404 Media. TeleMessage is an Israeli company that provides modded versions of encrypted messaging apps like Signal and Telegram. It was revealed last week that former US National Security Adviser Mike Waltz used TeleMessage’s modified version of Signal to archive messages. Today's report indicated the presence of other high-ranking government officials in archived chats on the a
Keywords: app hacker like officials telemessage
Find related items on AmazonPublished on: 2025-07-18 07:45:19
In Brief GlobalX, an airline used by the Trump administration as part of its massive deportation campaign, has reportedly been hacked. On Monday, 404 Media first reported news of the breach, based on a defacement message on the airline’s official website and stolen data that the hackers shared with the news website. “Anonymous has decided to enforce the Judge’s order since you and your sycophant staff ignore lawful orders that go against your fascist plans,” wrote the hackers, who claimed to
Keywords: administration airline anonymous globalx hackers
Find related items on AmazonPublished on: 2025-07-19 09:11:17
TeleMessage, an Israeli company that sells an unofficial Signal message archiving tool used by some U.S. government officials, has suspended all services after reportedly being hacked. Smarsh, the parent company of TeleMessage, confirmed that all TeleMessage services have been suspended while it's investigating what it described as "a potential security incident." "TeleMessage is investigating a potential security incident. Upon detection, we acted quickly to contain it and engaged an external
Keywords: hacker messages services signal telemessage
Find related items on AmazonPublished on: 2025-07-19 13:45:19
In Brief GlobalX, an airline used by the Trump administration as part of its massive deportation campaign, has reportedly been hacked. On Monday, 404 Media first reported news of the breach, based on a defacement message on the airline’s official website and stolen data that the hackers shared with the news website. “Anonymous has decided to enforce the Judge’s order since you and your sycophant staff ignore lawful orders that go against your fascist plans,” wrote the hackers, who claimed to
Keywords: administration airline anonymous globalx hackers
Find related items on AmazonPublished on: 2025-07-21 07:41:13
Co-op cyber attack affects customer data, firm admits, after hackers contact BBC 2 hours ago Share Save Joe Tidy Cyber correspondent, BBC World Service Share Save Getty Images Cyber criminals have told BBC News their hack against Co-op is far more serious than the company previously admitted. Hackers contacted the BBC with proof they had infiltrated IT networks and stolen huge amounts of customer and employee data. After being approached on Friday, a Co-op spokesperson said the hackers "acces
Keywords: bbc cyber data hackers op
Find related items on AmazonPublished on: 2025-07-21 17:41:13
Co-op hackers stole 'significant' amount of customer data 20 minutes ago Share Save Joe Tidy Cyber correspondent, BBC World Service Share Save Getty Images Cyber criminals have told BBC News their hack against Co-op is far more serious than the company has previously told the public. Hackers contacted the BBC with proof they had infiltrated IT networks and stolen huge amounts of customer and employee data. After being contacted on Friday, a Co-op spokesperson said the hackers "accessed data r
Keywords: bbc cyber data hackers op
Find related items on AmazonPublished on: 2025-07-25 05:21:22
Co-op cyber attack: Staff urged to keep cameras on in meetings It comes as supermarket Marks & Spencer (M&S) struggles with a major ransomware attack. It is not known if the hacks are linked. It disclosed on Wednesday that it had shut down parts of its IT systems in response to hackers attempting to gain access. In an internal email to the 70,000 members of staff at the supermarket, funeral service and insurance company, workers are being urged to be vigilant as IT teams work to ensure hacker
Keywords: attack cyber hackers internal op
Find related items on AmazonPublished on: 2025-07-25 05:00:05
Spring cleaning means more than just dusting off your curtains or decluttering your desk. It's also the perfect time to tidy up your digital life, starting with your passwords. World Password Day is observed on the first Thursday in May, a day that's been encouraging people to review their passwords and security settings since Intel created the event in 2013. Read more: Best Password Manager in 2025 Nearly every year, a list of the worst passwords makes the rounds online, and the same weak ch
Keywords: accounts hackers nordpass password passwords
Find related items on AmazonPublished on: 2025-07-27 14:45:50
Co-op fends off hackers as police probe M&S cyber attack The Co-op has shut down parts of its IT systems in response to hackers attempting to gain access to them. It said the "proactive measures" it had taken to fend off the attack had had a "small impact" on its call centre and back office. Meanwhile, The Metropolitan Police has confirmed it's looking into the major cyber attack at fellow retailer Marks & Spencer (M&S). "Detectives from the Met's cyber crime unit are investigating," it said
Keywords: attack cyber hackers op said
Find related items on AmazonPublished on: 2025-07-29 21:00:00
Hackers working for governments were responsible for the majority of attributed zero-day exploits used in real-world cyberattacks last year, per new research from Google. Google’s report said that the number of zero-day exploits — referring to security flaws that were unknown to the software makers at the time hackers abused them — had dropped from 98 exploits in 2023 to 75 exploits in 2024. But the report noted that of the proportion of zero-days that Google could attribute — meaning identifyi
Keywords: day exploits google hackers zero
Find related items on AmazonPublished on: 2025-07-30 01:06:23
What is bug hunting and why is it changing? 54 minutes ago Share Save Joe Fay Technology Reporter Share Save Bugcrowd At events like Bugcrowd Bug Bash hackers compete to find software bugs Few technology careers offer the chance to demonstrate your skills in exclusive venues worldwide, from luxury hotels to Las Vegas e-sports arenas, peers cheering you on as your name moves up the leaderboard and your earnings rack up. But that's what Brandyn Murtagh experienced within his first year as a bug
Keywords: bug bugcrowd hackers says security
Find related items on AmazonPublished on: 2025-08-01 21:35:00
The cybersecurity world is full of jargon and lingo. At TechCrunch, we have been writing about cybersecurity for years, and we frequently use technical terms and expressions to describe the nature of what is happening in the world. That’s why we have created this glossary, which includes some of the most common — and not so common — words and expressions that we use in our articles, and explanations of how, and why, we use them. This is a developing compendium, and we will update it regularly.
Keywords: access data hackers malicious security
Find related items on AmazonPublished on: 2025-08-14 01:33:08
These days, hackers don't break in — they log in. Using valid credentials, cybercriminals bypass security systems while appearing legitimate to monitoring tools. And the problem is widespread; Google Cloud reports that weak or nonexistent credential protection facilitates 47% of cloud breaches, while IBM X-Force attributes nearly one-third of global cyberattacks to account compromises. So what does this mean for your organization’s defenses? Here’s what you need to know about how to protect y
Keywords: based credential credentials hackers systems
Find related items on AmazonPublished on: 2025-08-11 10:33:10
It looks like your JavaScript is disabled. To use HackerOne, enable JavaScript in your browser and refresh this page.
Keywords: browser disabled enable hackerone javascript
Find related items on AmazonPublished on: 2025-08-23 21:00:00
On February 21, the largest crypto heist ever started to unfold. Hackers gained control of a crypto wallet belonging to the world’s second-largest cryptocurrency exchange, Bybit, and stole almost $1.5 billion of digital tokens. They quickly shunted the money between dozens of cryptocurrency wallets and services to try and obscure the activity, before starting to cash the stolen funds out. The eye-popping digital raid had all the hallmarks of being conducted by one of North Korea’s elite subgrou
Keywords: cryptocurrency hackers north says tradertraitor
Find related items on AmazonPublished on: 2025-08-23 21:00:00
The Most Dangerous Hackers You’ve Never Heard Of From crypto kingpins to sophisticated scammers, these are the lesser-known hacking groups that should be on your radar.
Keywords: crypto dangerous groups hackers hacking
Find related items on AmazonPublished on: 2025-08-31 17:39:00
DragonImages/Getty Images When I grew up, we didn't have smart devices. TVs, bulbs, and even telephones were simple analog devices. If you'd told my grandmother that she had to update her TV or lightbulb, she'd have thought you were asking to buy a new, replacement device -- not download a software update. But today, almost all electronic devices -- even those lightbulbs -- have a digital circuit at their core. And those digital circuits need to be upgraded to remain compatible with ecosystem
Keywords: hackers just run update updates
Find related items on AmazonPublished on: 2025-09-01 11:32:48
LLM plugin for pulling content from Hacker News Installation Install this plugin in the same environment as LLM. llm install llm-hacker-news Usage You can feed a full conversation thread from Hacker News into LLM using the hn: fragment with the ID of the conversation. For example: llm -f hn:43615912 ' summary with illustrative direct quotes ' Item IDs can be found in the URL of the conversation thread. Development To set up this plugin locally, first checkout the code. Then create a new
Keywords: conversation hacker install llm news
Find related items on AmazonPublished on: 2025-09-09 01:25:23
Open-plan offices offer few pleasures; one of them is snooping on other people’s browsing habits. When, years ago, I began working for tech companies in San Francisco, I noticed that my co-workers were always scrolling through a beige, text-only Web site that resembled a nineteen-nineties Internet forum. They were reading Hacker News—a link aggregator and message board that is something of a Silicon Valley institution. Technologists in Silicon Valley assume familiarity with Hacker News, just as
Keywords: gackle hacker news people site
Find related items on AmazonPublished on: 2025-09-13 04:10:14
PM Images/Getty Images I have given hundreds of cybersecurity-related webcasts and presentations, written hundreds of cybersecurity-related articles, and been involved in hundreds of one-on-one cybersecurity-related meetings with clients. Someone will always respond, comment, or protest that their business is too small for a hacker's attention. Small target illusion But none of these folks understand the economics of a hack when it comes to small businesses. There isn't a random guy out ther
Keywords: businesses hackers malware small software
Find related items on AmazonPublished on: 2025-09-13 05:00:14
style-photography/Getty Images When I grew up, we didn't have smart devices. TVs, bulbs, and even telephones were simple analog devices. If you'd told my grandmother that she had to update her TV or lightbulb, she'd have thought you were asking to buy a new, replacement device -- not download a software update. But today, almost all electronic devices -- even those lightbulbs -- have a digital circuit at their core. And those digital circuits need to be upgraded to remain compatible with ecosy
Keywords: hackers just run update updates
Find related items on AmazonGo K’awiil is a project by nerdhub.co that curates technology news from a variety of trusted sources. We built this site because, although news aggregation is incredibly useful, many platforms are cluttered with intrusive ads and heavy JavaScript that can make mobile browsing a hassle. By hand-selecting our favorite tech news outlets, we’ve created a cleaner, more mobile-friendly experience.
Your privacy is important to us. Go K’awiil does not use analytics tools such as Facebook Pixel or Google Analytics. The only tracking occurs through affiliate links to amazon.com, which are tagged with our Amazon affiliate code, helping us earn a small commission.
We are not currently offering ad space. However, if you’re interested in advertising with us, please get in touch at [email protected] and we’ll be happy to review your submission.