Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

Can You Get Hacked by Replying to a Scam Text?

No, you cannot get hacked by replying to a scam text, but you can get hacked from a scam text if you click on a malicious link the scammer sends you. According to the Federal Trade Commission (FTC), Americans lost a total of $330 million from scam texts in 2022, making scam texts a serious threat to your online security. Continue reading to learn how to spot scam texts and the common scam text tactics that scammers use.

Chicago Medical Center Notifies 216k+ Patients Following Hacker Data Breach

Community First Medical Center (CFMC) is a medical and nursing facility that serves Chicagoland and Illinois broadly. They employ over 300 individuals who preside over a 299-bed hospital campus. Originally named Our Lady of the Resurrection Hospital, CFMC provides community-focused healthcare, diagnostics, and treatments. If you have received services from CFMC, your private information might have been stolen in a recent data breach.

$3,000 of Gas Stolen from Hacked Pumps in Detroit

Detroit is Michigan’s largest city, hosting a population of more than 630,000 people. The area is called “Motor City” for its contributions to the automobile industry in the 1950s. More than 2.8 million cars belong to Detroit residents—and gas prices have reached a $3.72 gallon average. More cars are on the roads than ever before, but the cost of running them is taking its toll.

Tech Talk: Supply Chain Hardware Hacking

This is a Bulletproof Tech Talk article: original research from our penetration testing team covering issues, news, and tech that interests them. It’s more technical and in-depth that our usual blog content, but no less interesting. Some readers may remember an article published by Bloomberg entitled "The Big Hack: How China used a Tiny Chip to Infiltrate U.S. Companies".

What To Do if You Get Hacked

The first thing to do after realizing you’ve been hacked is to secure your accounts by immediately changing all of your passwords and enabling Multi-Factor Authentication (MFA). You should also scan your device with antivirus software, secure your home WiFi network and reset your device. Read on to learn ten steps you should take after discovering you’ve been hacked and the telltale signs that you’ve been hacked.

EP 36 - The Evolution of an Ethical Hacker

Our guest today is Phillip Wylie, an offensive security professional and evangelist, author and podcast host who recently added director of services and training at Scythe to his extensive CV. Wylie talks with host David Puner about the critical need for ethical hacking in cybersecurity, identity security revelations from years of penetration testing, and his fascinating career arc, which began in professional wrestling. Considering a cybersecurity career?

China's Cyber Offensive: FBI Director Reveals Unmatched Scale of Hacking Operations

WASHINGTON – In a startling revelation, FBI Director Chris Wray disclosed at a recent conference that China's cyber espionage capabilities are so extensive, they bigger than the efforts of all other major nations combined. While the U.S. government has long been cautioning against the cyber threats emanating from China, Wray's statements took the conversation to a new level of urgency.

Caesars Entertainment Gets Hacked, Exposing Countless Gamblers

Caesars Entertainment is one of the largest casino companies in the United States and is well-known for its loyalty program. The company serves countless customers in Las Vegas and elsewhere throughout the world. The massive loyalty program takes in data from all of Caesars customers, and that program may have just backfired on the company, potentially hurting many of its customers in the process.

Demystifying the Dark Web and DarkNets, Part IV - Corporate Spies, Scammers, Spammers, Stalkers, and Cyber Criminals

September 7, 2023 Author: Anonymous Hacker, as told to Lindsey Watts Preface: Thus far in our series, we’ve looked at what DarkNet types exist in addition to the dark web, communication methodologies on DarkNets, social-ethical questions raised by anonymous, and unregulated and un-censored communication platforms. Your interest might be piqued at this point but if not hold onto your seat because it’s about to be.