T-Mobile confirms to have been a Lapsus$’s victim

T-Mobile

Although it had been believed that the Lapsus$ extortion group had retired for a vacation, added to the news that several of its members were arrested, including the alleged leader, it turns out that between March and April they have been very active with other attacks on important companies. In this case, T-Mobile, dedicated to […]

Meet DDoSecrets successor to Wikileaks

DDoSecrets

Julian Assange’s Wikileaks was a very shocking portal that caused a lot of havoc in the world. However, since the arrest of its creator, things in that area had calmed down. But in the year 2020, a new name, DDoSecrets (acronym for Distributed Denial of Secrets) started to emerge. Currently, this group is one of […]

Ukrainian soldiers are hacked

Ukrainian soldiers

You might think that cyberwarfare only targets large corporations and government agencies of the parties involved in the conflicts. It turns out that, in these modern times, a pattern is being noticed where groups attack and access people’s accounts. In this case, the Ukrainian soldiers were the latest victims of a Belarusian hacker group. Read […]

Alleged members of Lapsus$ were arrested in London

alleged members of Lapsus$

Lapsus$ has become the most wanted cybercriminal group so far after the series of hacks in recent months with high-impact profiles such as Samsung, Microsoft, NVIDIA, and others. It should be noted that their first big blow was last December to a ministry in Brazil. How have they managed to do so much damage with […]

The New Generation of Cybercriminals Surprises

new generation of cybercriminals

In an increasingly technological and digital world, it should not surprise us that advances in these technologies are quickly learned and used by young people. It is not strange to see children between the ages of 3 and 10 handling a smartphone as if they were adults. That is why the new generation of cybercriminals […]

Hackers Are Using Cloud Services to Spread Malware

cloud services

Hackers are using cloud services offered by companies like Amazon and Microsoft to successfully distribute malware, such as remote access Trojans known as Nanocore, Netwire, and AsyncRAT, gaining access to systems and compromising information. Read all about this new method in this article. Read: Google Chrome is Patching Several Vulnerabilities Cloud services are the perfect […]

Ethical hacking, does it exist?

ethical hacking

Do ethics and hackers go along well? This question implies several factors but, surprisingly, yes. There is a practice called ethical hacking, which involves hackers doing what they know, but not with bad intentions. Actually, this type of hacking comes from investigation and the desire to help protect systems and networks. Let’s dive into what […]

Notorious hackers of all time

notorious hackers

Hackers had always taken advantage of the vulnerabilities found in any system or network, but several of them have become so famous that they are called “Notorious Hackers.” Some are quite easy to recognize, while others are not that famous, but they left their print on the hacking history. This article will show the five […]

What hackers are hunting when they attack

hackers are hunting

Many are quite familiar with the term hacking thanks to movies and TV shows, but what exactly are the hackers hunting during those exciting and action-packed scenes? Well, the answer is not far from reality, just a little more boring than what appears in those fictional stories. Hackers are hunting any valuable data that they […]

How hackers access a system

hackers access a system

Many organizations relied on their professional teams to keep up with security in any aspect, but we are humans, and some mistakes are bound to happen. That is where hackers attack, taking advantage of security flaws. So, how can hackers access a system? Well, the answer is a little complicated. However, here at Eagle Tech, […]