HackMyIP

网络安全资讯

来自顶级安全媒体的最新动态

2026-05-10BleepingComputer
German Police Shut Down Relaunched Crimenetwork Marketplace, Arrest Admin

German law‑enforcement agencies, led by the Federal Criminal Police Office (BKA) and the Hessian State Criminal Police Office (LKA Hessen) in close coordination with Europol’s Euro...

PrivacyEncryptionThreat Intel
Read More → Use Tool →
2026-05-08The Record
GM Pays $12M in Largest CCPA Settlement for Driver Data Violations

General Motors has agreed to pay a $12.75 million settlement to the State of California for collecting and sharing sensitive driver data without proper consent, marking the largest...

PrivacyRegulationData Breach
Read More → Use Tool →
2026-05-08The Hacker News
Fake Call History Apps Steal Payments After 7.3M Google Play Downloads

Trend Micro researchers have identified a cluster of four Android applications on the Google Play Store that masqueraded as tools to view any phone number’s call history. The apps,...

MalwarePrivacySupply Chain
Read More → Use Tool →
2026-05-08BleepingComputer
NVIDIA Confirms GeForce NOW Data Breach Affects Armenian Users

NVIDIA has officially confirmed a data breach impacting its GeForce NOW service, exposing personal information for a subset of users in Armenia. The disclosure, made in a statement...

Data BreachPrivacyCloud Security
Read More → Use Tool →
2026-05-08BleepingComputer
Zara Data Breach Exposes 197K Customers’ Personal Data

Zara, the Spanish fast‑fashion giant, has confirmed a data breach that exposed the personal information of approximately 197,000 customers. The compromise was uncovered after the b...

Data BreachPrivacy
Read More → Use Tool →
2026-05-08Dark Reading
ShinyHunters Claims Second Instructure Breach: 300M+ Users Exposed

ShinyHunters, the notorious threat group behind a string of high‑profile data thefts, announced on March 5 that it had executed a second intrusion into Instructure, the education‑t...

Data BreachAPTPrivacy
Read More → Use Tool →
2026-05-07BleepingComputer
How Browsers Bypass DLP: AI Prompts and Copy/Paste Create Data Leakage

Organizations investing heavily in data loss prevention (DLP) solutions are discovering a critical blind spot: the browser has become the primary vector for inadvertent data exfilt...

Data BreachAI SecurityPrivacy
Read More → Use Tool →
2026-05-07BleepingComputer
US Sentenced for Laptop Farms Used by North Korean Remote IT Workers

Two U.S. nationals were sentenced to 18 months in federal prison each for managing laptop farms that facilitated North Korean IT workers in securing remote positions at nearly 70 A...

APTSupply ChainPrivacy
Read More → Use Tool →
2026-05-07BleepingComputer
California Man Gets 6.5 Years for $230M Crypto Heist, Money Laundering

Ethan J. Rivera, a 20‑year‑old from Los Angeles, California, was sentenced on Friday to 78 months (6.5 years) in federal prison for his role in a sophisticated criminal operation t...

Threat IntelPrivacyEncryption
Read More → Use Tool →
2026-05-06Dark Reading
CloudZ RAT and Pheno Plug-in Target Windows Phone Link for Text Theft

Security researchers have uncovered a sophisticated cyberattack campaign leveraging the Windows Phone Link application to steal text messages and circumvent two-factor authenticati...

MalwareAuthenticationPrivacy
Read More → Use Tool →
2026-05-05The Hacker News
1M Exposed AI Services Reveal Alarming Security Gaps

A joint research effort by the Security Research Lab (SRL) and the AI Security Initiative (AISI) scanned over one million publicly reachable AI endpoints across IPv4 space between ...

AI SecurityVulnerabilityPrivacy
Read More → Use Tool →
2026-05-05BleepingComputer
Instructure Breach: Hacker Claims 280M Records from 8,800 Schools

Education technology provider Instructure has disclosed a significant data breach after a threat actor operating under the alias 'CSAMKing' claimed to have stolen approximately 280...

Data BreachPrivacyThreat Intel
Read More → Use Tool →
2026-05-05BleepingComputer
FTC Bans Kochava from Selling US Location Data Without Consent

The Federal Trade Commission announced a settlement with data broker Kochava and its subsidiary Collective Data Solutions (CDS) that prohibits them from selling or sharing precise ...

PrivacyRegulation
Read More → Use Tool →
2026-05-05BleepingComputer
Vimeo Data Breach Exposes 119,000 Users' Personal Information

The ShinyHunters extortion group has claimed responsibility for a significant data breach at Vimeo, the popular online video platform owned by IAC. Security researchers first ident...

Data BreachPrivacy
Read More → Use Tool →
2026-05-05BleepingComputer
CloudZ RAT Abuses Microsoft Phone Link to Steal SMS & OTPs

Security researchers have uncovered a new variant of the CloudZ remote‑access trojan (RAT) that delivers a previously undocumented plugin named Pheno. This plugin exploits the Micr...

MalwarePrivacyVulnerability
Read More → Use Tool →
2026-05-04BleepingComputer
Credit Union Loan Fraud: Stolen Identity Verification Exposed

Fraudsters are not breaking into credit unions with zero‑days or ransomware; they are exploiting the normal loan origination workflow. Flare’s threat‑intelligence team uncovered a ...

AuthenticationThreat IntelPrivacy
Read More → Use Tool →
2026-05-03BleepingComputer
Instructure Data Breach: ShinyHunters Claim 4.5M Records Stolen

Instructure, the educational technology company behind the popular Canvas learning‑management system, confirmed on March 5 2026 that unauthorized actors had accessed its internal n...

Data BreachThreat IntelPrivacy
Read More → Use Tool →
2026-05-02BleepingComputer
Microsoft Unveils Faster Windows 11 Run Dialog with Dark Mode

Microsoft has begun rolling out a preview of a modernized Run dialog for Windows 11, promising a noticeable boost in responsiveness and the addition of a native dark mode. The upda...

VulnerabilityPrivacy
Read More → Use Tool →
2026-05-01Dark Reading
Join Our Caption Contest: Celebrate 20 Years of Cybersecurity Progress

Dark Reading is inviting security professionals and enthusiasts to take part in a caption contest that reflects on two decades of cybersecurity evolution. The competition, titled "...

VulnerabilityPrivacy
Read More → Use Tool →
2026-05-01Dark Reading
Dark Reading Celebrates 20 Years of Cybersecurity Coverage

Dark Reading marks its 20th anniversary this month, reflecting on two decades of delivering timely cybersecurity news, analysis, and insights to professionals worldwide. Launched o...

Threat IntelPrivacyRegulation
Read More → Use Tool →
2026-05-01BleepingComputer
15-Year-Old Detained Over France Titres Data Breach

French police (the Direction centrale de la police judiciaire, DCPJ) and the Paris Prosecutor’s Office have detained a 15‑year‑old, known by the alias "M4L", on suspicion of sellin...

Data BreachPrivacy
Read More → Use Tool →
2026-05-01BleepingComputer
BleepingComputer Retracts Instructure Data Breach Story After Review

BleepingComputer published a story on March 5, 2026 claiming that Instructure, the education‑technology company behind the Canvas learning‑management platform, had suffered a new d...

Data BreachPrivacy
Read More → Use Tool →
2026-05-01BleepingComputer
Microsoft Lets Admins Uninstall Pre-installed Store Apps in Windows 11

Microsoft has expanded its Windows 11 in‑box app removal policy by adding a dynamic list that lets IT administrators select exactly which pre‑installed Microsoft Store applications...

PrivacyVulnerability
Read More → Use Tool →
2026-05-01BleepingComputer
Windows 11 KB5083631 Security Update Adds Xbox Mode, 34 Fixes

Microsoft released the optional cumulative update KB5083631 for Windows 11 22H2, delivering 34 changes that span new functionality, performance tweaks, and critical security patche...

VulnerabilityPrivacy
Read More → Use Tool →
2026-04-28Dark Reading
Chris Inglis Reflects on NSA Failures 13 Years After Snowden Leaks

Chris Inglis, who served as NSA Deputy Director from 2011 to 2014 under Director Keith Alexander, has broken his silence on the agency's missteps during the Edward Snowden affair, ...

PrivacyThreat IntelRegulation
Read More → Use Tool →
2026-04-27The Hacker News
Fake CAPTCHA IRSF Scam: 120 Keitaro Campaigns Fuel Global SMS and Crypto Fraud

Security researchers at Group-IB have uncovered a large-scale smishing operation that combines fake CAPTCHA verification pages with International Revenue Share Fraud (IRSF) and cry...

PhishingThreat IntelPrivacy
Read More → Use Tool →
2026-04-24Dark Reading
Helping Romance Scam Victims: Cross-Agency, Proactive Approach

Romance scams, a form of confidence scheme that preys on emotional trust, continue to trap thousands of victims each year. Security analysts note that those who fall prey to these ...

PhishingPrivacyRegulation
Read More → Use Tool →
2026-04-24Dark Reading
US Charges 29 in Myanmar Investment Fraud Ring, Seizes 500+ Domains

The US Department of Justice has announced the indictment of 29 individuals linked to a cyber fraud syndicate operating from Myanmar, charging them with conspiracy to commit wire f...

PhishingThreat IntelPrivacy
Read More → Use Tool →
2026-04-24The Hacker News
Fake Apple Crypto Wallet Apps Steal Seed Phrases – 26 Apps Detected

Cybersecurity researchers at CleverSight Threat Intelligence have uncovered a cluster of 26 malicious iOS applications that masquerade as popular cryptocurrency wallets such as Tru...

MalwarePhishingPrivacy
Read More → Use Tool →
2026-04-20Dark Reading
WhatsApp Metadata Leak Exposes User Info to Attackers

WhatsApp has patched a critical flaw that allowed attackers to harvest user metadata simply by knowing a victim's phone number, according to a Dark Reading analysis published this ...

PrivacyVulnerabilityData Breach
Read More → Use Tool →
2026-04-06KrebsOnSecurity
Germany Doxes 'UNKN', Head of REvil & GandCrab Ransomware Gangs

German authorities have publicly exposed the identity of the notorious hacker known as "UNKN", linking the alias to 31‑year‑old Russian national Daniil Maksimov. Maksimov is allege...

RansomwareThreat IntelPrivacy
Read More → Use Tool →
2026-03-17Ars Technica
World ID Iris Tokens to Secure AI Agents, Prevent Swarms

Worldcoin’s World ID initiative, built by Tools for Humanity, is deploying a biometric authentication system based on iris scanning to assign a unique human identity to every AI ag...

AI SecurityPrivacyAuthentication
Read More → Use Tool →
2026-03-08KrebsOnSecurity
AI Assistants Redefine Cybersecurity Landscape

AI assistants, often marketed as autonomous "agents", are rapidly becoming a staple in developer toolchains, promising to automate everything from code generation to system configu...

AI SecurityAI ThreatsPrivacy
Read More → Use Tool →
2026-03-03Ars Technica
Google Tightens Android Developer Verification: Security vs Open Access

Google has announced significant changes to its Android app distribution model, implementing mandatory developer verification for all apps published on Google Play Store. The new r...

RegulationPrivacyAuthentication
Read More → Use Tool →
2026-01-15Ars Technica
Google Fast Pair Flaw Exposes Bluetooth Devices to WhisperPair Attack

Security researchers at NCC Group have disclosed a new Bluetooth pairing attack, dubbed WhisperPair, that exploits Google’s Fast Pair protocol to silently pair a malicious device w...

VulnerabilityPrivacyZero-Day
Read More → Use Tool →
2025-12-15Ars Technica
Google Ends Dark Web Report Service: Leaked Data Alerts Stop

Google announced on Monday that it will retire the Dark Web Report feature from its Google Account dashboard, ending a service that warned users when their personal information app...

Data BreachPrivacy
Read More → Use Tool →
2025-10-30Ars Technica
Pixel Devices Exposed: Which Pixels Are Vulnerable to Cellebrite?

A leaked document published by the dark‑web user W1ckedG0pher has disclosed the full roster of Google Pixel phones that can be compromised by Cellebrite’s Universal Forensic Extrac...

VulnerabilityPrivacyEncryption
Read More → Use Tool →
2025-10-03Ars Technica
Google Confirms Android Developer Verification Tiers: Free and Paid Options

Google has officially announced its Android developer verification program will feature both free and paid tiers, marking a significant shift in how developers are authenticated be...

Supply ChainAuthenticationPrivacy
Read More → Use Tool →
2025-09-08Ars Technica
WhatsApp Security Boss Sues Meta Over 'Cult' Culture, User Growth Over Safety

Former WhatsApp security chief filed a lawsuit against Meta Platforms Inc., alleging that the company consistently placed user‑acquisition targets ahead of critical security measur...

PrivacyVulnerability
Read More → Use Tool →
2025-09-02Ars Technica
Google Defends Gmail Security Amid Breach Claims

Google on Monday rebuffed recent reports—published by Ars Technica—that claimed a massive breach exposing all 2.5 billion Gmail accounts, asserting that its security controls are r...

Cloud SecurityPrivacyData Breach
Read More → Use Tool →
2025-07-09Ars Technica
Browser Extensions Hijack 1M Browsers for Scraping Bots

Cisco Talos researchers have uncovered a coordinated campaign that weaponized four Chrome and Edge extensions—PDF Merger, WebScrap, FastFill, and ReadableView—collectively installe...

MalwarePrivacySupply Chain
Read More → Use Tool →
2025-07-07Ars Technica
Android Gemini Access to Third‑Party Apps: Privacy Risks in 2024

Starting Monday, Google began rolling out a platform update for Android 14 (API level 34) that expands the capabilities of its on‑device AI assistant, Gemini. The change introduces...

PrivacyAI Security
Read More → Use Tool →
2025-06-05Ars Technica
Nintendo Warns Switch 2 GameChat Records Chats, Shares Data on Request

Nintendo has alerted owners of its upcoming Switch 2 console that the built‑in GameChat feature creates temporary local copies of voice and text conversations, and that those recor...

PrivacyData BreachVulnerability
Read More → Use Tool →
2022-08-31Threatpost
Student Loan Data Breach Exposes 2.5M Records

Over the weekend, Nelnet Servicing, a major U.S. student‑loan servicer operating under contract with the Department of Education’s Federal Student Aid (FSA) office, disclosed a dat...

Data BreachPrivacyVulnerability
Read More → Use Tool →
2022-08-25Threatpost
Chinese Surveillance Camera Flaw Exposes Thousands to Hackers

Cybercriminals are now hawking root access to tens of thousands of unpatched Chinese‑made surveillance cameras, a market that has surged after the disclosure of a critical remote‑c...

VulnerabilityZero-DayPrivacy
Read More → Use Tool →
2022-08-24Threatpost
Twitter Security Lapses: Whistleblower Alleges National Risk

Peiter “Mudge” Zatko, Twitter’s former head of security, filed a whistleblower complaint in July 2022 with the Federal Trade Commission (FTC) and the Senate Select Committee on Int...

PrivacyData BreachRegulation
Read More → Use Tool →
2022-08-22Threatpost
Fake Travel Reservation Links Target Weary Travelers

A wave of phishing campaigns masquerading as airline and hotel reservation confirmations is compounding the frustration of travelers already grappling with cancellations and overbo...

PhishingMalwarePrivacy
Read More → Use Tool →