Korean Telco Giant SK Telecom Hacked
SK Telecom, South Korea’s largest telecom company, disclosed a data leak involving a malware infection.
The post Korean Telco Giant SK Telecom Hacked appeared first on SecurityWeek.
More results...
SK Telecom, South Korea’s largest telecom company, disclosed a data leak involving a malware infection.
The post Korean Telco Giant SK Telecom Hacked appeared first on SecurityWeek.
The city of Abilene, Texas, is scrambling to restore systems that have been taken offline in response to a cyberattack.
The post Cyberattack Knocks Texas City’s Systems Offline appeared first on SecurityWeek.
A Russian state-linked hacking group is ramping up its cyberattacks against diplomatic targets across Europe, using a new stealthy malware tool known as “GrapeLoader” to deliver malicious payloads through cleverly disguised phishing emails. According to Check Point Research, the campaign began in January 2025 and is being carried out by APT29 — also known as […]
The post Russian Hackers Target European Diplomats with ‘Wine-Tasting’ Phishing Scams appeared first on eSecurity Planet.
The Wall Street Journal has the story:
Chinese officials acknowledged in a secret December meeting that Beijing was behind a widespread series of alarming cyberattacks on U.S. infrastructure, according to people familiar with the matter, underscoring how hostilities between the two superpowers are continuing to escalate.
The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwan, the people, who declined to be named, said.
The admission wasn’t explicit:…
The Rising Threat of QR Code-Driven Phishing Schemes A new kind of cyberattack has emerged in recent years as a result of QR codes’ popularity as a quick and easy way to share information. Businesses are increasingly at risk from quishing, also known as QR code phishing. Phishing emails contain QR codes that hackers use […]
The post QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.
Organizations must recognize that security is not about the number of tools deployed, it is about ensuring those tools effectively disrupt the attack chain at every stage.
The post A Guide to Security Investments: The Anatomy of a Cyberattack appeared …
Lots of interesting details in the story:
The US Department of Justice on Wednesday announced the indictment of 12 Chinese individuals accused of more than a decade of hacker intrusions around the world, including eight staffers for the contractor i-Soon, two officials at China’s Ministry of Public Security who allegedly worked with them, and two other alleged hackers who are said to be part of the Chinese hacker group APT27, or Silk Typhoon, which prosecutors say was involved in the US Treasury breach late last year.
[…]
According to prosecutors, the group as a whole has targeted US state and federal agencies, foreign ministries of countries across Asia, Chinese dissidents, US-based media outlets that have criticized the Chinese government, and most recently the US Treasury, which was breached between September and December of last year. An internal Treasury report …
Information is coming to light on the cyberattack that caused X outages, but it should be taken with a pinch of salt.
The post Hackers Take Credit for X Cyberattack appeared first on SecurityWeek.
National Presto Industries says a cyberattack has resulted in a system outage and operational disruptions.
The post Cyberattack Disrupts National Presto Industries Operations appeared first on SecurityWeek.
The Polish space agency POLSA says it has disconnected its network from the internet to contain a cyberattack.
The post Polish Space Agency Hit by Cyberattack appeared first on SecurityWeek.