Davey Winder reports: Last year, during the Pwn2Own hacking event in Austin, Texas, the Samsung Galaxy S21 was hacked, not once but twice, across a period of just 48 hours. This year, at the Pwn2Own competition in Toronto, Canada, elite hacking teams went one better: Samsung’s flagship Galaxy S22 smartphone fell to zero-day exploits twice on…
Category: Commentaries and Analyses
Turkish journalist faces 12 years in prison for announcing personal data leak
Turkish Minute reports: Turkish prosecutors are seeking a prison sentence of 12 years for journalist İbrahim Haskoloğlu, who was briefly detained in April after announcing that hackers had stolen personal information from government websites, the journalist announced on social media, the Stockholm Center for Freedom reported. In his tweets in April, Haskoloğlu said a group of…
Sneaky hackers reverse defense mitigations when detected
Bill Toulas reports: A financially motivated threat actor is hacking telecommunication service providers and business process outsourcing firms, actively reversing defensive mitigations applied when the breach is detected. The campaign was spotted by Crowdstrike, who says the attacks started in June 2022 and are still ongoing, with the security researchers able to identify five distinct…
Paying the Ransom in Response to a Ransomware Attack can Sometimes Backfire
Nolan Goldberg and Margaret Ukwu of Proskauer write: A new study by Hiscox, a privacy and cyber security insurance company, sheds light on additional practical concerns that should be taken into account in that balancing of potential risks and benefits. Hiscox released its sixth annual Cyber Readiness Report 2022. In it, Hiscox raises a number…
After Discovery of Huge Data Breach, Twitter Alternative Hive Goes Offline
Lucas Ropek reports: Not long after Elon Musk took over Twitter and started doing a whole lot of crazy stuff to the platform, the microblogging app Hive Social saw a huge spike in users. Apparently fed up with Elon’s shit, a bunch of people had decided to try out alternative social media sites—and Hive was one of them. Launched back in…
Darknet markets generate millions in revenue selling stolen personal data
Christian Jordan Howell and David Maimon report: …. This trafficking of stolen data between producers, wholesalers, and consumers is enabled by darknet markets, which are websites that resemble ordinary e-commerce websites but are accessible only using special browsers or authorization codes. We found several thousand vendors selling tens of thousands of stolen data products on 30 darknet…