State-Sponsored Hackers Use AI Technology from OpenAI and Microsoft to Enhance Hacking Skills

State-Sponsored Hackers Use AI Technology from OpenAI and Microsoft to Enhance Hacking Skills

According to a recently published report by Microsoft, hackers sponsored by Russia, China and Iran are using artificial intelligence (AI) technology provided by OpenAI, a company enhanced by Microsoft, to improve their hacking skills and deceive their targets. Hacker groups linked to military intelligence services The hacker groups identified in the report have links to … Read more

Hackers Reveal Iran-Russia Arms Deal: Shahed Drones Sold for Gold

Hackers Reveal Iran-Russia Arms Deal: Shahed Drones Sold for Gold

The group claims to have exfiltrated around 10 gigabytes of data from a shell company known as “Sahara Thunder”, which acts as a front for the IRGK, facilitating Iran’s arms sales to Russia. The drones are said to be designed and manufactured by “Shahed Aviation Industries Research Center”. It is an Iranian company that also … Read more

Smartphone Light Sensors Used by Hackers to Spy and Track User Activities: MIT Study

Smartphone Light Sensors Used by Hackers to Spy and Track User Activities: MIT Study

Wednesday, January 24 2024 – 14:04 WIB Jakarta – The benefits of smartphones are very diverse, and this feature is exploited by hackers or hackers through the light sensors on these devices. A study conducted by the Massachusetts Institute of Technology (MIT) Team in the United States revealed that cell phones can also function as … Read more

Orbit Bridge Protocol Hacked: $82 Million Stolen Before New Year

Orbit Bridge Protocol Hacked: $82 Million Stolen Before New Year

Hackers reportedly stole $82 million from the Orbit Bridge project, a cross-chain protocol service, just three hours before the start of the new year. In a post on December 31, user officer_cia also posted similar information. Looks like orbit bridge is getting drained right now, different fresh wallets for wbtc usdt usdc and dai, test … Read more

Insomniac Games Hacked: Marvel’s Spider-Man 3, Wolverine, and X-Men Development Files Exposed

Insomniac Games Hacked: Marvel’s Spider-Man 3, Wolverine, and X-Men Development Files Exposed

Insomniac Games, the developer of “Marvel’s Spider-Man” and “Ragette & Clark”, recently suffered a shocking hacker attack, and earlier disclosed more than 1.3 million files on the Internet. Unpublished development files for “Marvel’s Spider-Man 3”, “Marvel’s Wolverine” and “Marvel’s X-Men” have been exposed. Among them, the documents exposed for “Marvel Wolverine” include plot, cast, game … Read more

Sony PlayStation 5 Pro and Marvel’s Wolverine Game Details Leaked in Insomniac Games Ransomware Attack

Sony PlayStation 5 Pro and Marvel’s Wolverine Game Details Leaked in Insomniac Games Ransomware Attack

They won’t have a quiet end of the year at Sony. In the morning, we informed you about the first possible details of the console PlayStation 5 Pro and recently the Rhysida ransomware group boasted about hacking the studio Insomniac Games. The group was supposed to get information about the upcoming game Marvel’s Wolverinewhich is … Read more

Ransomware Attack on ICBC Bank Causes Disruption in U.S. Bond Market

Ransomware Attack on ICBC Bank Causes Disruption in U.S. Bond Market

International news 12:25 p.m. 2023-11-10 Industrial and Commercial Bank of China (ICBC) has been the target of a group of high-profile hackers who have attacked other organizations in the UK in the past year, including Boeing, ION Trading UK and Royal Mail Bloomberg news agency reported citing sources that The hacker group in question is … Read more

Russian National Payment Card System (NSCP) Hacked: Millions of Clients’ Personal Data Endangered

The hackers managed to “download a lot of interesting information from the servers of the Mir payment system.” Hackers managed to hack page Russian National Payment Card System (NSCP), which is the operator of the national payment system “Mir” and processes Visa and Mastercard payments. As it turned out, Russian “specialists” of IT products, working … Read more

The Risk of Second Cyberattacks: Case Studies and Vulnerabilities to Address

The Risk of Second Cyberattacks: Case Studies and Vulnerabilities to Address

Companies that are victims of a compromise are not safe from a second cyberattack in the following months. Cyber ​​experts describe two cases of attacks a few months apart. When there are more, well there are still more! Coming out of a cyberattack doesn’t mean that hackers will stop there. Regardless of the state of … Read more

Sony Interactive Entertainment Data Breach: Cyber Attack Exposes Employee Information and Company Vulnerabilities

Sony Interactive Entertainment Data Breach: Cyber Attack Exposes Employee Information and Company Vulnerabilities

Sony Interactive Entertainment became the victim of another cyber attack that compromised the personal data of nearly 7,000 current and former employees. The data was already leaked from the platform in the summer of this year MOVEit Transfer. This is what the people at Sony use to transfer files. SIE confirmed the breach and simultaneously … Read more