#hijacking

[ follow ]
#ransomware
Information security
fromFuturism
6 hours ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

A ransomware negotiator conspired with hackers, betraying clients and facilitating attacks against multiple companies.
Law
fromTheregister
5 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Healthcare
fromNextgov.com
5 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromThe Hacker News
5 days ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A ransomware negotiator pleaded guilty to aiding BlackCat ransomware attacks against U.S. companies in 2023.
Information security
fromFuturism
6 hours ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

A ransomware negotiator conspired with hackers, betraying clients and facilitating attacks against multiple companies.
Law
fromTheregister
5 days ago

Third ransomware pro pleads guilty to cybercrime U-turn

Angelo Martino pleaded guilty to aiding the ALPHV/BlackCat ransomware gang in extorting US businesses.
Healthcare
fromNextgov.com
5 days ago

Former FBI official proposes terror designations for ransomware hackers targeting hospitals

Ransomware actors targeting critical infrastructure may be designated as terrorists, allowing for expanded legal actions against them.
Law
fromThe Hacker News
5 days ago

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

A ransomware negotiator pleaded guilty to aiding BlackCat ransomware attacks against U.S. companies in 2023.
World news
fromIndependent
1 day ago

Decryption tech breakthrough that helped snare Kinahan may now take down his army of hitmen

Deciphered phone messages led to the arrest of Daniel Kinahan and may help dismantle his criminal organization.
Privacy professionals
fromwww.theguardian.com
3 days ago

Criminal gangs profiting as child sexual abuse websites double, experts say

The number of commercial child sexual abuse websites has doubled in a year, highlighting a significant increase in online exploitation by criminal gangs.
#drones
Russo-Ukrainian War
fromNextgov.com
6 days ago

AI capabilities are needed to counter drone threats, senator says

The U.S. must adopt new AI capabilities to counter the growing threat of unmanned drones used by foreign adversaries.
NYC parents
fromFuturism
1 month ago

Quadcopter Drone Caught Trying to Deliver Hunting Knives to Inmates in Prison

Drones are increasingly used to smuggle contraband into prisons, posing a significant security threat.
Russo-Ukrainian War
fromNextgov.com
6 days ago

AI capabilities are needed to counter drone threats, senator says

The U.S. must adopt new AI capabilities to counter the growing threat of unmanned drones used by foreign adversaries.
NYC parents
fromFuturism
1 month ago

Quadcopter Drone Caught Trying to Deliver Hunting Knives to Inmates in Prison

Drones are increasingly used to smuggle contraband into prisons, posing a significant security threat.
World politics
fromwww.dw.com
1 week ago

US strikes on drug boats spark legal controversy

The US Navy has resumed attacks on alleged drug smuggler vessels, resulting in over 50 ships sunk and 177 suspects killed since September 2025.
EU data protection
fromSecurityWeek
1 week ago

53 DDoS Domains Taken Down by Law Enforcement

Law enforcement in 21 countries coordinated to disrupt DDoS-for-hire services, resulting in arrests and the takedown of numerous domains.
#cybersecurity
Information security
fromTechRepublic
4 days ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
fromTechCrunch
1 month ago
Privacy professionals

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

Information security
fromTechCrunch
3 weeks ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromMail Online
1 month ago

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
Information security
fromThe New Yorker
2 days ago

How Big a Threat Are Iranian-Backed Cyber Attacks?

Iranian cyber actors have accessed critical U.S. infrastructure, highlighting vulnerabilities in cybersecurity and the ongoing nature of nation-state hacking.
Information security
fromTechRepublic
4 days ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
Privacy professionals
fromTechCrunch
1 month ago

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

The FBI seized two websites operated by pro-Iranian hacktivist group Handala, which conducted cyberattacks against U.S. companies and published information about individuals linked to Israeli military and defense contractors.
Information security
fromTheregister
2 weeks ago

'Several dozen' orgs targeted by a new extortion crew

A new extortion crew, UNC6783, targets high-value corporations using phishing and social engineering tactics to steal sensitive data.
Information security
fromTechCrunch
3 weeks ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromMail Online
1 month ago

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
Cryptocurrency
fromSecurityWeek
1 week ago

International Operation Targets Multimillion-Dollar Crypto Theft Schemes

Operation Atlantic targets multimillion-dollar cryptocurrency theft, freezing $12 million in stolen assets and identifying over $45 million in stolen funds.
#malware
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromSecurityWeek
1 week ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromSecurityWeek
1 week ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
fromwww.bbc.com
2 weeks ago

Teen tried to buy gun for terrorist attack, court told

Alfie Coleman, 21, from Great Notley, Essex, had spent the previous months messaging people who he thought were fellow extremists in 2023. In fact, they were MI5 operatives who arranged to sell him a pistol and ammunition.
London politics
World politics
fromJezebel
1 week ago

The U.S. Has Now Killed at Least 168 People in 'Narcoterrorist' Boat Strikes

The U.S. continues to conduct lethal operations against alleged narcoterrorists in the Pacific, raising concerns about legality and transparency.
Information security
fromIT Brew
3 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
#ice
US politics
fromSilicon Canals
3 weeks ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 weeks ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 weeks ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 weeks ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
Information security
fromWIRED
4 days ago

AI Tools Are Helping Mediocre North Korean Hackers Steal Millions

AI tools have enabled unskilled hackers to execute sophisticated cybercrime operations, resulting in significant financial theft.
fromwww.theguardian.com
3 weeks ago

US marine detained after TSA finds live explosive round in checked bag

The marine told investigators he found the round in the field about a year ago and kept it, thinking it wasn't live. Due to extensive rust and corrosion, the round's original identifying paint markings were no longer visible, making it difficult to determine whether it was an inert training munition or a live explosive device.
Los Angeles
#aviation-safety
Austin
fromFast Company
4 weeks ago

This new tech could help prevent future runway crashes

New runway collision warning technology could significantly enhance aviation safety by providing pilots with immediate alerts.
Austin
fromFast Company
4 weeks ago

This new tech could help prevent future runway crashes

New runway collision warning technology could significantly enhance aviation safety by providing pilots with immediate alerts.
fromSecurityWeek
6 days ago

Bluesky Disrupted by Sophisticated DDoS Attack

The attack is impacting our application, with users experiencing intermittent interruptions in service for their feeds, notifications, threads and search.
Information security
#cybercrime
Information security
fromSecurityWeek
1 week ago

Triad Nexus Evades Sanctions to Fuel Cybercrime

Triad Nexus is a cybercrime network responsible for over $200 million in losses through scams and money laundering, using various techniques to evade sanctions.
US politics
fromNextgov.com
1 month ago

'No practical use': TSA experts say Trump's ICE deployments won't help with airport security

Shifting ICE personnel to airports aims to alleviate TSA staffing shortages but will have minimal impact on security operations.
US politics
fromwww.aljazeera.com
1 month ago

Why the US Homeland Security shutdown is raising fears of airport delays

TSA workers are resigning due to unpaid wages during a government shutdown caused by partisan disagreements over Department of Homeland Security funding and immigration policy reforms.
#prison-security
UK news
fromwww.bbc.com
1 month ago

Gang which used drones for prison drops jailed

A seven-member gang was jailed for using drones to smuggle drugs, weapons, and mobile phones into prisons across London, accounting for approximately 75% of all drone drops in the region.
UK news
fromwww.independent.co.uk
1 month ago

Gang jailed for drone smuggling scheme likened to Uber Eats for prisoners'

A gang orchestrated drone deliveries of drugs, weapons, and phones into UK prisons, operating like a delivery service for inmates between December 2024 and February 2025.
UK news
fromwww.bbc.com
1 month ago

Gang which used drones for prison drops jailed

A seven-member gang was jailed for using drones to smuggle drugs, weapons, and mobile phones into prisons across London, accounting for approximately 75% of all drone drops in the region.
UK news
fromwww.independent.co.uk
1 month ago

Gang jailed for drone smuggling scheme likened to Uber Eats for prisoners'

A gang orchestrated drone deliveries of drugs, weapons, and phones into UK prisons, operating like a delivery service for inmates between December 2024 and February 2025.
US news
fromwww.mediaite.com
1 month ago

Heads Down! Hands Up!' Passengers Capture Scary Moment Feds Storm Plane to Deal With Possible Security Matter'

Southwest Flight 2094 made an emergency landing in Atlanta after a possible security matter, with federal officers and police boarding to detain a passenger amid reports of a bomb threat.
fromTravel + Leisure
1 month ago

Is Your Airplane Wi-Fi Really Safe? Security Experts Weigh In

In-flight Wi-Fi is roughly on par with hotel or airport Wi-Fi. It's not automatically unsafe, but it's not something you should blindly trust either. You're on a shared network with hundreds of other people, and you don't know how well it's segmented or monitored.
Privacy technologies
Information security
fromSecurityWeek
3 weeks ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
#atm-jackpotting
fromTechCrunch
2 months ago
Science

FBI says ATM 'jackpotting' attacks are on the rise, and netting hackers millions in stolen cash | TechCrunch

fromTechCrunch
2 months ago
Science

FBI says ATM 'jackpotting' attacks are on the rise, and netting hackers millions in stolen cash | TechCrunch

Travel
fromTravel + Leisure
2 months ago

In-flight Theft Happens More Than You Think-but These 9 Expert Tips Can Help You Avoid Being a Target

In-flight theft is rising globally, affecting long-haul and short-haul flights and leaving many cases unreported, increasing risk for sleeping or inattentive passengers.
Mental health
fromPsychology Today
1 month ago

Hope in Hostage-Taking and Kidnapping Incidents

Narratives shape how people process trauma and build resilience, while uncertainty from wrongful detention creates profound psychological strain that unfolds silently within families.
Artificial intelligence
fromFuturism
1 month ago

AI Tools Are Supercharging Hackers

AI systems are increasingly weaponized for cybercrime, enabling hackers to exploit vulnerabilities at scale with minimal technical expertise, as demonstrated by recent attacks on Mexican government networks and global firewall systems.
US news
fromSecuritymagazine
1 month ago

Airport Security Challenges in the Midst of the DHS Shutdown

DHS shutdown causes TSA staffing shortages, creating extended airport security lines nationwide as spring travel increases.
US politics
fromEmptywheel
2 months ago

Drone War Secrecy and Kill or Capture

The NDAA and Obama-era drone program emphasize secrecy, legal resistance to declassification, and reliance on presidential authority for targeted killings.
Information security
fromThe Hacker News
1 month ago

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

The U.S. Department of Justice disrupted several IoT botnets, including AISURU and Kimwolf, in a coordinated international law enforcement operation.
Information security
fromTechzine Global
1 month ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
#credential-theft
fromSecurityWeek
1 month ago
Information security

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
Information security
fromTheregister
1 month ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
Information security
fromSecurityWeek
1 month ago

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
Information security
fromTheregister
1 month ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
Information security
fromComputerWeekly.com
1 month ago

Interpol obliterates cyber criminal infrastructure | Computer Weekly

Interpol's Operation Synergia III neutralized 45,000 malicious IP addresses and servers across 72 countries, resulting in 94 arrests and over 100 investigations targeting cyber fraud, phishing, malware, and ransomware infrastructure.
Information security
fromTheregister
1 month ago

Interpol sinkholes 45,000 IPs linked to global cybercrime

Interpol arrested 94 cybercriminals across multiple countries during Operation Synergia III, seizing 212 devices and sinkholing over 45,000 malicious IP addresses linked to phishing, romance scams, and credit card fraud.
Information security
fromPCMAG
12 years ago

'SkyJack' Software Finds and Hijacks Drones

SkyJack enables drones to autonomously locate, hack, and commandeer nearby Parrot-model drones via Wi-Fi, creating controllable 'zombie' drone fleets.
Information security
fromTheregister
1 month ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
Information security
fromInfoWorld
2 months ago

Crooks are hijacking and reselling AI infrastructure: Report

Threat actors are probing and hijacking exposed corporate LLM and MCP endpoints to steal compute, exfiltrate data, and resell API access for profit.
Information security
fromSecurityWeek
2 months ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromSecurityWeek
1 month ago

Iranian APT Hacked US Airport, Bank, Software Company

Iranian APT MuddyWater compromised networks across US aerospace, defense, banking, and NGO sectors, deploying new backdoors Dindoor and Fakeset amid regional military tensions.
Information security
fromTheregister
2 months ago

Energy infrastructure cyberattacks are suddenly in fashion

Infrastructure cyberattacks are now mature, integrated into military strategy, and increasingly accessible due to democratized tools, exposing underfunded systems to severe disruption.
fromThe Hacker News
1 month ago

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

The hacktivist threat in the Middle East is highly lopsided, with two groups, Keymous+ and DieNet, driving nearly 70% of all attack activity between February 28 and March 2. In all, a total of 149 hacktivist DDoS claims were recorded targeting 110 distinct organizations across 16 countries. The attacks were carried out by 12 different groups, including Keymous+, DieNet, and NoName057(16), which accounted for 74.6% of all activity.
Information security
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
fromTheregister
2 months ago

Google cripples IPIDEA proxy network abused by crims

Google's Threat Intelligence Group (GTIG) describes IPIDEA as a "little-known component of the digital ecosystem" and says that in a seven-day period in January 2026, it observed more than 550 threat groups using IPIDEA exit nodes. GTIG said that proxy network operators sometimes pay app developers to embed proxy SDKs so that any device that downloads the app is enrolled in the network.
Information security
[ Load more ]