North Korea’s ‘Bureau 121’ Has an Army of 6000 Hackers

North Korea’s ‘Bureau 121’ Has an Army of 6000 Hackers

The U.S. Army has revealed that North Korea has a number of divisions dedicated to cryptocurrency and related cybercrimes. A report unveiled by the U.S. Army reveals that North Korea now has more than 6,000 hackers stationed in countries such as Belarus, China, India, Malaysia, Russia, among others. The operations of four sub divisions are…

Microsoft Put Off Fixing Zero Day for 2 Years

Microsoft Put Off Fixing Zero Day for 2 Years

A security flaw in the way Microsoft Windows guards users against malicious files was actively exploited in malware attacks for two years before last week, when Microsoft finally issued a software update to correct the problem. By Brian Krebs of Krebs on Security One of the 120 security holes Microsoft fixed on Aug. 11’s Patch…

US Medical Debt Collection Firm R1 RCM Hit in Ransomware Attack

US Medical Debt Collection Firm R1 RCM Hit in Ransomware Attack

“Medical Debt Collection” is a phenomena specific to the USA, a country without general health coverage By Brian Krebs of KrebsOnSecurity R1 RCM Inc. [NASDAQ:RCM], one of the nation’s largest medical debt collection companies, has been hit in a ransomware attack. Formerly known as Accretive Health Inc., Chicago-based R1 RCM brought in revenues of $1.18…

ReVoLTE Attack Allows Hackers to Listen in on Mobile Calls

ReVoLTE Attack Allows Hackers to Listen in on Mobile Calls

Rare attack on cellular protocol exploits an encryption-implementation flaw at base stations to record voice calls. Researchers have discovered an attack on the Voice over LTE (VoLTE) mobile communications protocol that can break its encryption and allow attackers to listen in on phone calls. Dubbed ReVoLTE, the attack — detailed by a group of academic…

Amazon Alexa ‘One-Click’ Attack Can Divulge Personal Data

Amazon Alexa ‘One-Click’ Attack Can Divulge Personal Data

Researchers disclosed flaws in Amazon Alexa that could allow attackers to access personal data and install skills on Echo devices. Vulnerabilities in Amazon’s Alexa virtual assistant platform could allow attackers to access users’ banking data history or home addresses – simply by persuading them to click on a malicious link. Researchers with Check Point found…

Das passiert in einer Minute im Internet

Das passiert in einer Minute im Internet

Unendliche Weiten, riesige Datenmengen. Könnt ihr euch vorstellen, was innerhalb von einer Minute im Internet passiert? Diese Infografik zeigt es euch. In einer Zeit, in der wir praktisch 24 Stunden am Tag online sind, geht es im Internet zu wie in einem Taubenschlag. Unzählige Whatsapp-Nachrichten werden verschickt, Hunderttausende Apps werden heruntergeladen und etliche Stunden auf…

Cyberagentur geht offiziell an den Start

Cyberagentur geht offiziell an den Start

Im Juli 2019 wurde am Flughafen Leipzig/Halle eine Absichtserklärung zur Errichtung der Cyberagentur unterzeichnet. Mit dabei waren Peter Tauber (von links, CDU), Parlamentarische Staatssekretär im Verteidigungsministerium, Bundesinnenminister Horst Seehofer (CSU), Sachsen-Anhalts Ministerpräsident Reiner Haseloff (CDU) und Sachsens Ministerpräsident Michael Kretschmer (CDU). von dpa – 12.08.2020 “Zur Sicherstellung digitaler Souveränität” soll unter Federführung von Verteidigungs- und…

DEF CON 2020 Wrap-Up: Hacking Phones, Cars, and Satellites

DEF CON 2020 Wrap-Up: Hacking Phones, Cars, and Satellites

see all DEFCON 2020 presentations: https://www.youtube.com/user/DEFCONConference/videos Tens of researchers showcased their work last week at the DEF CON 28 Safe Mode (virtual) hacking conference 2020. They presented research on hacking phones, cars, satellite communications, traffic lights, smart home devices, printers, and popular software services, among many others. Here is a summary of some of the…

The New US Cyber Policy Has Serious Bite for Chinese Firms

The New US Cyber Policy Has Serious Bite for Chinese Firms

Mike Pompeo’s announcement will hit Chinese internet companies at their most vulnerable spots. On August 5, U.S. Secretary of State Mike Pompeo made a major announcement regarding U.S. cyberspace. Depicting the Chinese Communist Party as a malign actor that aggressively intrudes on U.S. telecommunications and technology infrastructures, Pompeo said the U.S. government will initiate a…

Vulnerabilities in Qualcomm Snapdragon Chips Expose Billions of Devices to Attacks

Vulnerabilities in Qualcomm Snapdragon Chips Expose Billions of Devices to Attacks

Security researchers have identified hundreds of vulnerabilities that expose devices with Qualcomm Snapdragon chips to attacks. During a presentation at DEF CON last week, Check Point security researcher Slava Makkaveev revealed how vulnerabilities in the compute digital-signal processor (DSP) – a subsystem that enables the processing of data with low power consumption – could open…

Rund 9 von 10 PCs laufen mit Windows :(

Rund 9 von 10 PCs laufen mit Windows :(

Windows 10 feiert am 29. Juli 2020 seinen fünften Geburtstag. Das Betriebssystem ist mit einem Marktanteil von rund 59 Prozent die meistverbreitete Betriebssoftware weltweit vor seinem älteren “Bruder” Windows 7. Erst an dritter Stelle steht ein Konkurrent aus dem Hause Apple – die aktuellste OS-Version des Mac bringt es auf gerade einmal 4,5 Prozent Marktanteil,…

Thinking of a Cybersecurity Career? Read This.

Thinking of a Cybersecurity Career? Read This.

By Brian Krebs Thousands of people graduate from colleges and universities each year with cybersecurity or computer science degrees only to find employers are less than thrilled about their hands-on, foundational skills. Here’s a look at a recent survey that identified some of the bigger skills gaps, and some thoughts about how those seeking a…

More Than 1,000 People Could Access Twitter’s ‘God Mode’

More Than 1,000 People Could Access Twitter’s ‘God Mode’

The admin panel used by hackers to access over one hundred accounts can be used by over 1,000 twitter employees — two former Twitter employees revealed. More than 1,000 Twitter employees and contractors had access to the internal admin panel that enabled last week’s Twitter hack of 130 high profile accounts. According to Reuters on…

Crack SSH Private Key Passwords with John the Ripper [Tutorial]

Cyber Weapons Lab, Episode 176 The Secure Shell network protocol, usually used to manage remote machines, is prone to password brute-forcing. That’s why key-based authentication is used when security is paramount since private keys can be encrypted. But nothing is invincible, and these SSH private key passwords can still be cracked. In this episode of…

How new prototyping dollars will help US Army network modernization

How new prototyping dollars will help US Army network modernization

U.S. Army Cpl. Andrew Ramirez, assigned to Bravo Company, 44th Expeditionary Signal Battalion, 2nd Theater Signal Brigade, talks on a radio during during exercise Stoney Run, April 24, 2018 in the Sennelager Training Area, Germany. Stoney Run is an annual U.S.-U.K. signal exercise designed to test and validate communications and network capabilities, and enhance interoperability…