Search
+
    SEARCHED FOR:

    CYBER HACKING

    Technological cooperation as the basis of digital sovereignty

    Positive Hack Days, a major cybersecurity festival in Moscow, addressed digital sovereignty and international cooperation. The event, supported by the Russian government, drew participants from over 40 countries to discuss overcoming dependence on global tech giants. Positive Technologies proposed collaborative development and knowledge sharing to achieve digital autonomy, offering its expertise and training programs to friendly nations.

    World War III fears rise as Iran tells the UN it will respond with full force against Israel — here's how it could retaliate

    World War 3 fears explode as Iran retaliation for Israeli attack is now in motion as Tehran begins with drone strikes, but this could just be the start. Iran is warning of much stronger responses, from missile attacks and cyber warfare to using its proxies like Hezbollah and the Houthis. It could also block the Strait of Hormuz, risking a global oil crisis. With nuclear escalation now on the table, fears of a wider Middle East conflict are growing. As Israel stays on alert and oil prices soar, the world watches what Iran will do next. This could reshape the entire region—and the global economy.

    Taiwan cyber unit says it will not be intimidated by China bounty offer

    Late Wednesday, Taiwan's defence ministry's electronic force command said China was continuing to use "fictitious cyber hacking incidents to distort the facts" and offering cross-border rewards. According to Taiwan's constitution, China's communist party has no legal jurisdiction over the island and its laws have "no real binding force" on Taiwan's people, it said in a statement.

    Chinese hackers, user lapses turn smartphones into 'mobile security crisis'

    A sophisticated cyberattack, potentially linked to Chinese hackers, targeted smartphones of individuals in government, politics, tech, and journalism, raising concerns about mobile device vulnerabilities. US authorities are increasingly focused on China's cyber espionage efforts, including attempts to access texts and calls of Americans and infiltrate telecom networks.

    Operation Social Media: The India-Pakistan war wasn’t just over borders

    After a terror attack in Kashmir, India and Pakistan clashed in a new kind of war, fought with misinformation and digital deception. As India struck terror targets, social media exploded with false claims, doctored videos, and viral lies designed to inflame tensions and distort reality. This exposé reveals how ‘Operation Social Media’ became a battleground of digital deception and psychological warfare, testing India’s cyber defenses, media credibility, and strategic clarity in the age of hybrid conflict.

    After Operation Spiderweb and the Kerch bridge blast, Ukraine now hacks Russia's Tupolev bomber produce

    Ukraine's HUR hacked Tupolev, a major Russian aircraft manufacturer. The cyber operation secured 4.4 GB of internal data. This included personnel files and confidential communications. The hack exposed details of engineers working on strategic bombers. Ukrainian operatives replaced Tupolev's website with a symbolic image.

    • Singapore HC axes WazirX restructure plan after $235-million cyber heist

      Sources privy to Wednesday's hearing told ET, the Singapore court observed that WazirX-operating entity Zettai Pte Ltd was not registered in India and hence the restructuring Scheme shall not be valid.

      ETtech Explainer: Why WazirX’s recovery plan hit a legal roadblock

      Last year, ET reported that WazirX was hit by one of the biggest cyberattacks on an Indian crypto exchange. Hackers made off with more than $230 million worth of investor funds, nearly half of the platform's estimated reserves. Blockchain experts indicated possible involvement of the cybercriminal group Lazarus in the attack.

      China issues bounty for hackers it says are linked to Taiwan

      Chinese authorities accused Taiwan of organising, planning and premeditating attacks on key sectors such as military, aerospace, government departments, energy and transportation, maritime affairs, science and technology research firms in China as well as in special administration regions Hong Kong and Macau, Xinhua said.

      Six Chilling Ways Putin’s Russia Could Destroy the UK Within Hours: British Government Warns

      The UK government warns that if war breaks out, Russia could attack the country in fast and dangerous ways, like using drones, missiles, hackers, and fake news. Britain is not fully ready, but new defence steps are being planned.

      Victoria's Secret says cyber incident led to temporary website shut down

      The company said it temporarily shut down its corporate systems and e-commerce website on May 26 and immediately enacted response protocols to attempt to contain and eradicate unauthorized network access. The website was restored on May 29.

      Cartier reports some customer data stolen in cyberattack

      The company said it had further enhanced the protection of its systems and data, as well as informed the relevant authorities, and was also working with "leading external cybersecurity experts." The attack is the latest case of a company being targeted by cyber criminals.

      'Forest Blizzard' vs 'Fancy Bear': Microsoft, Google, Crowdstrike hope to untangle weird hacker nicknames

      Microsoft, CrowdStrike, Google, and Palo Alto Networks are collaborating to create a public glossary of state-sponsored hacking groups, aiming to standardize the confusing array of nicknames currently used. This initiative seeks to improve clarity and accelerate collective defense against cyber threats.

      Shockwaves in Trump’s inner circle: Was Susie Wiles’ phone hacked? President breaks silence

      A top aide to President Trump, Susie Wiles, was reportedly hacked. The hacker used her phone to send fake messages. Trump brushed it off, calling her strong. This comes just after another White House chat leak, raising big questions about their digital security.

      Marvel Rivals Season 2.5 update: Ultron joins the fight, new team-ups revealed, solo mode launches June 6, and full patch notes detailed

      Marvel Rivals Season 2.5 update is here and it’s packed with action! From Ultron's big debut as a new playable character to fresh team-up abilities and a brand-new solo mode called Battle Matrix Protocol, this update changes the game in a big way. Players can expect buffs, nerfs, and gameplay tweaks that balance the battlefield. With six new team-ups and exciting quality-of-life updates, fans are in for a treat. The update goes live May 30, 2025, with the solo mode arriving June 6. Dive into everything new in Marvel Rivals Season 2.5—it’s too good to miss!

      Air traffic, defence sector on Russian hackers’ radar, alleges UK

      The United Kingdom and allies revealed a Russian cyber campaign. It targeted organisations aiding Ukraine and Western infrastructure since 2022. Russia's military intelligence used hacking to infiltrate networks. They stole sensitive data from defence, IT, and transport sectors. Internet cameras at Ukraine borders were hacked. The UK issued advisories and urged vigilance.

      Gujarat teen arrested for 50+ cyberattacks during 'Operation Sindoor'

      Gujarat ATS arrested Jasim Shahnawaz Ansari, 18, for alleged cyber terrorism, escalating attacks after India's Operation Sindoor. Ansari and juveniles targeted over 50 Indian government websites between April and May 2025, using DDoS attacks coordinated through the Telegram group "AnonSec." He learned Python and hacking tools online, posting anti-India messages after successful attacks. Authorities are investigating potential foreign influence.

      Queensland hacker Shane Duffy loses $4.5M in cybercrime asset seizure, including Bitcoins

      Australian authorities have successfully seized over $4.5 million in assets from Shane Stephen Duffy, a Queenslander accused of cybercrime. The assets, including a luxury mansion, a Mercedes-Benz, and nearly 25 Bitcoins, were forfeited following an AFP investigation into suspicious Bitcoin transactions dating back to 2013. This action underscores Australia's commitment to combating cybercrime by targeting and confiscating ill-gotten gains.

      Identity theft scams on the rise: Why you must be alert against new frauds and here’s how you can save yourself

      Scammers use fake bank calls and government impersonation. They also target businesses and exploit family emergencies. Experts advise caution. Verify requests through official channels. Never share OTPs or click on suspicious links. Stay alert and informed to protect yourself from these evolving threats. Read this story to know how you can protect yourself from such identity theft scams.

      Canadian Armed Forces move military vehicles for G7 Summit 2025 in Kananaskis

      Canada gears up for the 2025 G7 Summit in Kananaskis. Military vehicles are being moved between Edmonton and Calgary. The summit will address global issues like peace, economy, and digital transition. Security measures are in place, including highway checkpoints and trail closures. Key leaders will attend, and discussions will cover topics like the Ukraine conflict and North Korea's cyber activities.

      Coinbase expects up to $400 million hit from cyber attack

      Coinbase said a cyber attack exposed account data, including names, addresses and emails, for a "small subset" of users. The exchange expects costs of $180–$400 million and will reimburse customers who were tricked into transferring funds to the attacker.

      When the sky fell silent and the web lit up: Inside India’s fight against hybrid warfare

      During Operation Sindoor, India repelled a coordinated dual-front assault from Pakistan—drone swarms in the skies and cyberattacks across digital infrastructure. Pakistani unmanned aerial vehicles targeted key Indian Air Force bases, while state-backed hackers and disinformation campaigns struck websites, schools, financial systems, and public utilities. India’s air defence and cyber cells responded decisively, neutralising threats in real-time. Officials say the hybrid offensive was designed to disrupt and demoralise. Experts warn such warfare is the new norm, requiring continuous vigilance and technological readiness.

      Border fire draws in digital war, tourists looking for quick bucks

      Amid rising India-Pakistan tensions, foreign hacker groups—mainly novice “script kiddies”—are launching low-sophistication cyberattacks on Indian digital infrastructure. While many claims are fake or exaggerated, experts warn of real espionage threats from Pakistan-linked APT36. Attacks include phishing, DDoS, and defacements, often exploiting public emotion and misinformation.

      Pakistan-allied hackers launched 15 lakh cyber attacks on Indian websites; only 150 successful

      Following the Pahalgam terror strike, Maharashtra Cyber identified seven APT groups launching over 1.5 million cyber attacks on Indian critical infrastructure, with 150 succeeding. These attacks, originating from Pakistan, Bangladesh, and the Middle East, involved malware, DDoS, and website defacement. A report, "Road of Sindoor," details Pakistan-allied groups' hybrid warfare, including misinformation, prompting warnings against spreading fake news.

      Cyber attacks on India continue even after understanding with Pak: Cyber officials

      Maharashtra Cyber officials reported ongoing cyber attacks on Indian government websites. These attacks originated from Pakistan, Bangladesh, and the Middle East. Authorities debunked claims of data theft from Mumbai airport and other systems. Maharashtra Cyber saved Rupees 600 crore since 2019 by acting against cyber fraud. A CA student was arrested for insulting Hindu deities.

      Your phone might be hacked and this is the only sign you will see: Cybersecurity expert issues warning

      A cybersecurity expert has warned that an unusually fast-draining phone battery could be the most reliable sign that a smartphone has been hacked. Akash Mahajan, CEO of Kloudle, explained that malicious software often runs silently in the background, consuming power while collecting data or tracking activity. With mobile cybercrime on the rise—impacting millions in the US and nearly half of UK users—Mahajan advises users to take immediate steps if they notice abnormal battery behavior, including disconnecting from networks, running a security scan, updating the device, and reporting the incident.

      Cyber sleuths ramp up vigil on critical infra as Pakistan conflict spills online

      Early signs of heightened threat activity have already emerged across utilities such as oil and gas, electricity grids, and telecom networks, particularly in states bordering conflict zones and the national capital, cybersecurity experts tracking the events told ET.

      Google identifies new malware linked to Russia-based hacking group

      Google has uncovered a new malware called "LOSTKEYS," linked to Russian hacking group Cold River. Known for credential theft targeting NATO-linked figures, the group now uses this malware to steal files and system data, aiding Russian intelligence. Recent targets include advisers, NGOs, and journalists.

      Indian Army tightens cybersecurity after defence-linked websites come under attack

      After a wave of cyberattacks on Indian defence-linked websites, the Army is stepping up efforts to bolster its digital defences. Hackers have targeted several platforms, including Army schools and a public sector unit, amid rising tensions with Pakistan following the Pahalgam terror attack. Claims of data breaches from Pakistani hacker groups have been met with firm denials from Indian authorities. Cybersecurity teams are now actively monitoring the situation, with enhanced protocols being implemented to prevent future intrusions.

      Load More
    The Economic Times
    BACK TO TOP