How and Why Do Teens Become Cyber Criminals?

The search to find the mastermind of the attacker group Lapsus$ led to a home outside Oxford, England. The suspected leader was a 16-year-old. He helped take down some of the world’s biggest companies, including Microsoft, from his mother’s house. The BBC reported the teen is alleged to have earned $14 million from his attacks. […]

The post How and Why Do Teens Become Cyber Criminals? appeared first on Security Intelligence.

Continue reading How and Why Do Teens Become Cyber Criminals?

Treasury Department sanctions cryptocurrency ‘mixer’ Tornado Cash

Treasury accused the mixer of failing to stop laundering from malicious cyber actors including North Korea’s Lazarus Group.

The post Treasury Department sanctions cryptocurrency ‘mixer’ Tornado Cash appeared first on CyberScoop.

Continue reading Treasury Department sanctions cryptocurrency ‘mixer’ Tornado Cash

DDoS attacks in Q2 2022

Politically-motivated cyberattacks dominated the DDoS landscape in the second quarter of 2022 just as they did in Q1. Also, we saw the continuation of a trend that began in spring: an increase in superlong attacks. Continue reading DDoS attacks in Q2 2022

Russia Hackers Abusing BRc4 Red Team Penetration Tool in Recent Attacks

By Deeba Ahmed
Palo Alto Networks’ Unit 42 security researchers have discovered that Russian state-sponsored hackers are abusing the latest Brute…
This is a post from HackRead.com Read the original post: Russia Hackers Abusing BRc4 Red Team… Continue reading Russia Hackers Abusing BRc4 Red Team Penetration Tool in Recent Attacks

Microsoft investigating hacking group’s claims of successful breach

Cybercrime organization Lapsus$ posted suspicious screenshots. Microsoft officials said they are “aware of the claims and are investigating.”

The post Microsoft investigating hacking group’s claims of successful breach appeared first on CyberScoop.

Continue reading Microsoft investigating hacking group’s claims of successful breach

Great Computer Hacks Make Hackers Hacker Computers

In the year 1995, computers were, well… boring. The future wasn’t here yet, and computers were drab, chunky beige boxes. Sure, there were some cool-ish computers being sold, but the …read more Continue reading Great Computer Hacks Make Hackers Hacker Computers

New details emerge on prolific Conti-linked cybercrime group

Google’s Threat Analysis Group is calling the hackers Exotic Lily, and it says they employed relatively novel tactics.

The post New details emerge on prolific Conti-linked cybercrime group appeared first on CyberScoop.

Continue reading New details emerge on prolific Conti-linked cybercrime group