<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/">

<channel>
	<title>Hacking | Business Upturn</title>
	<atom:link href="https://www.businessupturn.com/news/topic/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businessupturn.com</link>
	<description>India&#039;s leading business and financial news portal — markets, economy, stocks and corporate news.</description>
	<lastBuildDate>Tue, 27 Feb 2024 09:58:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.businessupturn.com/wp-content/uploads/2023/07/favicon-150x150.jpg</url>
	<title>Hacking | Business Upturn</title>
	<link>https://www.businessupturn.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI risks to security discussed in Parliament</title>
		<link>https://www.businessupturn.com/technology/cyber-security/ai-risks-to-security-discussed-in-parliament/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Tue, 27 Feb 2024 09:58:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=404070</guid>

					<description><![CDATA[Experts at the UK Parliament discussed concerns about AI, including deepfakes, AI-powered hacking, and evolving ransomware threats. They called for addressing the cybersecurity skills gap, developing AI defenses, and proactive data protection.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:279&quot;&gt;The potential dangers of Artificial Intelligence (AI) to national security were at the forefront of discussions held in the UK Parliament recently. Leading figures from the British cybersecurity industry gathered to address the evolving threat landscape and brainstorm solutions.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:634&quot;&gt;The event, hosted by Member of Parliament Dean Russell and chaired by Steven George-Hilley of Centropy PR, featured a panel of experts who delved into the specific risks posed by AI advancements. These concerns ranged from the potential misuse of AI-generated deepfakes for malicious purposes, such as spreading misinformation or manipulating public opinion, to the increased sophistication of AI-powered hacking tools that could target critical national infrastructure. The rise of ransomware attacks, a growing threat in recent years, was also highlighted as likely to become even more complex with the integration of AI technology.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:638&quot;&gt;Beyond outlining the potential problems, the panel also emphasized the crucial need for proactive measures to address these emerging challenges. Victor Murineanu, CISO of Chelsea Football Club, underlined the importance of bridging the growing cyber skills gap in the UK. He called for increased investment in training and recruitment programs to equip young people with the necessary expertise to combat these future threats. This call to action resonated with cyber security specialist Sarah Rench from Avanade, who observed a positive trend of companies allocating more resources towards developing cyber skills within their workforce.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:441&quot;&gt;Nicko van Someren, the Chief Technology Officer of Absolute Software, emphasized the crucial role of staying ahead of the curve. He pointed out that the rapid advancements in AI not only pose new challenges but also present opportunities for strengthening defenses. He stressed the urgency of utilizing these advancements for defensive purposes, acknowledging that malicious actors are likely already exploring the offensive potential of AI.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:683&quot;&gt;The discussion also highlighted the importance of maintaining comprehensive visibility into IT systems. Paul Connaghan, a Principal Consultant specializing in application security at RiverSafe, argued that in the face of increasingly sophisticated threats like AI-powered attacks, having clear visibility into network activity, user behavior, and system performance is no longer optional but essential for building effective defensive strategies. He emphasized that investing in robust threat intelligence solutions that provide real-time insights is crucial for businesses to proactively identify and mitigate potential threats, ultimately protecting themselves and their employees.&lt;/p&gt;
&lt;p data-sourcepos=&quot;13:1-13:591&quot;&gt;The conversation also touched upon the need to anticipate future threats. Angus Lockhart, Chief Operating Officer at SECQAI, pointed out the escalating complexity of the cyber landscape, which he linked to rising global tensions and conflicts. He stressed the importance of ensuring the UK’s preparedness against both current and future threats. This, he suggested, involves mitigating existing cyber attacks by promoting the use of “memory safe” hardware and preparing for future threats like quantum computing by transitioning to Post-Quantum Cryptography, a more secure encryption method.&lt;/p&gt;
&lt;p data-sourcepos=&quot;15:1-15:418&quot;&gt;Finally, Nithin Thomas, Founder and CEO of Klarytee, emphasized the transformative potential of AI while simultaneously cautioning against its potential misuse. He warned that as businesses embrace AI’s capabilities, a new wave of cyber threats, powered by AI, is likely to emerge. He concluded by underlining the critical need for a proactive approach to data protection in the face of this evolving threat landscape.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/AI-risks-to-security-discussed-in-Parliament.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[AI risks to security discussed in Parliament]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/AI-risks-to-security-discussed-in-Parliament.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>North Korean hackers leverage AI, raising global cybersecurity concerns</title>
		<link>https://www.businessupturn.com/technology/cyber-security/north-korean-hackers-leverage-ai-raising-global-cybersecurity-concerns/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Sun, 25 Feb 2024 03:35:15 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[generative AI]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=403067</guid>

					<description><![CDATA[North Korea&apos;s AI-powered cyberattacks demand global cooperation, robust AI defenses, and responsible AI development for effective countermeasures.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:373&quot;&gt;North Korean hackers, long notorious for their audacious cyberattacks, have taken their game to the next level by incorporating generative artificial intelligence (AI) into their operations. This development, reported by security experts and intelligence agencies, marks a concerning escalation in the sophistication and potential impact of North Korea’s cyber threats.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:624&quot;&gt;Previously known for brazen attacks like the Bangladesh central bank heist and the WannaCry ransomware epidemic, North Korean hackers are now leveraging AI’s power to create more convincing online personas and tailor phishing campaigns with unprecedented precision. Imagine receiving a LinkedIn message from a seemingly legitimate recruiter, only to discover later it was a meticulously crafted AI-generated profile designed to steal your credentials. This is the reality that cybersecurity professionals now face, with the added complexity of AI-powered attacks blurring the lines between human and machine interaction.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:638&quot;&gt;The integration of AI raises several critical concerns. Firstly, it facilitates targeted espionage and financial theft, potentially fueling North Korea’s nuclear weapons program. The ability to bypass language barriers and generate realistic documents enables hackers to infiltrate sensitive networks and steal valuable information, intellectual property, and funds. Secondly, it complicates global cybersecurity efforts. Identifying and neutralizing AI-powered attacks requires advanced detection algorithms and constant adaptation, posing a significant challenge for defense systems designed to combat traditional cyber threats.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:499&quot;&gt;The report by the National Intelligence Service further highlights North Korea’s ambitious AI development, encompassing government, academic, and commercial sectors. This comprehensive approach suggests a strategic focus on leveraging AI across various domains, including public health, nuclear safety, and military simulations. While some private entities claim to have integrated AI into their surveillance systems, the true extent of North Korea’s AI capabilities remains shrouded in secrecy.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:458&quot;&gt;The arms race in the cybersecurity realm is intensifying, with both defense and offense adopting AI tools. While machine learning algorithms traditionally aided in identifying suspicious network activity, offensive actors are now exploring large language models like ChatGPT to automate and personalize attacks. This dual-use nature of AI underscores the need for responsible development and deployment, ensuring its benefits outweigh the potential harm.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:458&quot;&gt;Enhanced international cooperation is crucial to share intelligence, develop robust AI-powered defense systems, and establish clear norms for responsible AI development. Additionally, continued investment in research and development is essential to stay ahead of the curve and ensure effective countermeasures against AI-powered cyberattacks.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/North-Korean-hackers-leverage-AI-raising-global-cybersecurity-concerns.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[North Korean hackers leverage AI, raising global cybersecurity concerns]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/North-Korean-hackers-leverage-AI-raising-global-cybersecurity-concerns.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Teen Dating Violence awareness month highlights Tech-facilitated abuse</title>
		<link>https://www.businessupturn.com/technology/teen-dating-violence-awareness-month-highlights-tech-facilitated-abuse/</link>
		
		<dc:creator><![CDATA[Tushar Aggarwal]]></dc:creator>
		<pubDate>Sat, 24 Feb 2024 14:18:34 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=403194</guid>

					<description><![CDATA[February is Teen Dating Violence Awareness Month, shedding light on the rising threat of tech-facilitated abuse among teens. As technology becomes more advanced, so do the methods of abuse, including cyberflashing, hacking, controlling accounts, and using deepfakes and virtual impersonation to harass and manipulate victims.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;February is recognized as Teen Dating Violence Awareness Month, serving as a reminder of the prevalence and impact of dating violence among teenagers. As technology continues to advance, the threat of tech-facilitated abuse has become increasingly concerning, particularly among teens.&lt;/p&gt;
&lt;p&gt;Tech-facilitated abuse encompasses a range of behaviors, including cyberflashing, hacking and controlling accounts, sending harassing messages, sharing images without consent, and using deepfakes and virtual impersonation to manipulate or harm individuals. Kelli Owens, executive director of New York’s Office for Prevention of Domestic Violence (OPDV), emphasizes the seriousness of these issues, noting that such abuse can have lasting psychological effects on victims.&lt;/p&gt;
&lt;p&gt;According to a 2022 report by the U.S. Department of Justice, up to 19% of teens experience sexual or physical dating violence, while 48% face stalking or harassment. Additionally, as many as 65% of teens report psychological abuse in their relationships. These statistics underscore the prevalence and impact of teen dating violence, highlighting the urgent need for awareness and prevention efforts.&lt;/p&gt;
&lt;p&gt;Data from the Centers for Disease Control and Prevention’s 2019 Youth Risk Behavior Survey reveals that female students experience higher rates of both physical and sexual dating violence compared to male students. The survey also indicates that 6% of heterosexual students, 17% of LGBTQ students, and 14% of students unsure of their sexuality reported experiencing physical dating violence in the last 12 months&lt;/p&gt;
&lt;p&gt;Recognizing the growing threat of tech-facilitated abuse, OPDV has launched a new Tech Safety Guidebook to raise awareness and provide essential tips for staying safe online. Additionally, New York Governor Kathy Hochul has supported a new campaign to raise awareness about sextortion, a form of abuse often linked to personal relationships.&lt;/p&gt;
&lt;p&gt;Teen Dating Violence Awareness Month serves as a crucial reminder of the need to address the growing threat of tech-facilitated abuse among teenagers. By raising awareness, providing resources, and advocating for change, we can work towards creating safer online environments for all individuals.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Untitled-design-51-1.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Teen Dating Violence awareness month highlights Tech-facilitated abuse]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Untitled-design-51-1.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Chinese hacking group data leak exposes global targets</title>
		<link>https://www.businessupturn.com/technology/cyber-security/chinese-hacking-group-data-leak-exposes-global-targets/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 17:24:08 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[geopolitics]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Julian Assange]]></category>
		<category><![CDATA[Wikileaks]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=402762</guid>

					<description><![CDATA[A large amount of data from a Chinese state-linked hacking group has been leaked online. This leak comes at a time when Julian Assange, the founder of WikiLeaks, is facing extradition to the United States.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:487&quot;&gt;A massive leak of data from a state-linked hacking group in China has sent shockwaves through the cybersecurity world, offering an unprecedented glimpse into the secretive and expansive operations of the nation’s cyber espionage apparatus. The leaked files, attributed to a Shanghai-based group known as iSoon, paint a concerning picture of China’s aggressive tactics, targeting governments, companies, and individuals across the globe with a relentless pursuit of sensitive information.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:423&quot;&gt;The data dump, consisting of over 570 files encompassing contracts, target lists, and internal chat logs, landed on GitHub last week, sparking immediate scrutiny from cybersecurity experts worldwide. While the source of the leak remains shrouded in mystery, the authenticity of the files has been largely confirmed, raising serious questions about China’s cyber activities and their implications for international security.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:422&quot;&gt;The documents reveal a complex web of state-sanctioned hacking, with Chinese intelligence agencies, military, and police outsourcing their cyber operations to private contractors like iSoon. This practice, known as “offensive security,” allows the government to maintain plausible deniability while conducting aggressive cyber campaigns against foreign adversaries and domestic targets deemed threats to national security.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:575&quot;&gt;The leaked information exposes a vast network of targets spanning across 20 countries, including India, Taiwan, South Korea, and even close allies like Cambodia and Pakistan. The hackers sought a diverse range of data, from sensitive government road maps in Taiwan to immigration records in India and call logs from South Korean telecom giants. This insatiable appetite for intelligence highlights the strategic objectives of China’s cyber operations, which appear to go beyond mere espionage and delve into the realms of economic warfare and potential military preparedness.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:504&quot;&gt;Beyond the geopolitical implications, the leak also sheds light on the internal workings of China’s hacking industry. The data reveals complaints from disgruntled iSoon employees regarding low wages and demanding workloads, hinting at a culture of exploitation and pressure within the group. This glimpse into the human cost of cyber warfare adds another layer of complexity to the narrative, raising ethical questions about the individuals who are often instrumentalized in these clandestine operations.&lt;/p&gt;
&lt;p data-sourcepos=&quot;13:1-13:591&quot;&gt;The timing of this leak coincides with the ongoing legal battle surrounding Julian Assange, the founder of WikiLeaks, who faces extradition to the United States for his role in publishing classified information. This case has reignited debates about freedom of speech, press freedom, and the role of whistleblowers in exposing government wrongdoings. While the motivations behind the iSoon leak remain unclear, it undoubtedly raises similar questions about the ethical implications of exposing classified information, even when it pertains to potentially illegal or harmful state activities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;15:1-15:557&quot;&gt;In conclusion, the leak of data from iSoon represents a significant development in the ongoing saga of international cyber espionage. It exposes the vast scale and sophistication of China’s hacking operations, raising concerns about the potential for cyber conflict and the erosion of trust between nations.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Chinese-hacking-group-data-leak-exposes-global-targets.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Chinese hacking group data leak exposes global targets]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Chinese-hacking-group-data-leak-exposes-global-targets.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Iranian hackers target 2024 US Elections</title>
		<link>https://www.businessupturn.com/technology/cyber-security/iranian-hackers-target-2024-us-elections/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 17:24:08 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[Cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=402784</guid>

					<description><![CDATA[The 2024 US elections face a significant potential threat from Iranian state-sponsored hackers with a history of using disinformation, voter intimidation, and cyberattacks, posing a real danger to the integrity and security of the electoral process.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;The 2024 US elections, already brimming with political tension, face a potential cyber threat from Iran, according to a recent report by cybersecurity firm CrowdStrike. With a history of interference in US political events, Iran’s state-sponsored hackers are suspected to be planning similar disruptive tactics in the upcoming elections.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:560&quot;&gt;CrowdStrike, renowned for its expertise in combating cyber threats, specifically points towards the Islamic Republic’s history of meddling in US political affairs. The report meticulously details past instances, including the late 2020 Information Operations campaign, where Iranian actors unleashed a multifaceted attack. This involved sending intimidating emails to voters, impersonating a far-right US group and swaying their votes. Additionally, they disseminated fabricated videos alleging ballot tampering, aiming to sow distrust in the electoral system.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:309&quot;&gt;The report further predicts that these tactics, along with Distributed Denial-of-Service (DDoS) attacks and website defacements, are likely to resurface in 2024. These malicious activities have historically targeted state and local government entities, aiming to disrupt election infrastructure and sow chaos.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:426&quot;&gt;Furthermore, the report highlights a concerning trend observed in the latter half of 2023. “Iran-nexus adversaries” and Middle Eastern hacktivists were observed aligning their cyber operations with the kinetic operations stemming from the Israel-Hamas conflict. This suggests a potential escalation of cyber activities in the wake of geopolitical tensions, raising concerns about the 2024 US elections being collateral damage.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:240&quot;&gt;CrowdStrike’s warning echoes similar concerns voiced by Microsoft earlier this month. The tech giant identified Russia, Iran, and China as potential actors aiming to influence the upcoming elections in the United States and other countries.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Iranian-hackers-target-2024-US-Elections.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Iranian hackers target 2024 US Elections]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Iranian-hackers-target-2024-US-Elections.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Healthcare billing disruption caused by Optum hack</title>
		<link>https://www.businessupturn.com/technology/cyber-security/healthcare-billing-disruption-caused-by-optum-hack/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 17:24:08 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[america]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=402839</guid>

					<description><![CDATA[Optum hack hit US healthcare, shutting billing &amp; claims for hospitals, clinics &amp; pharmacies. ]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:428&quot;&gt;The American healthcare system was sent into disarray on February 21st, 2024, as a cyberattack targeted Optum, a subsidiary of UnitedHealth Group. Optum operates the Change Healthcare platform, a crucial cog in the nation’s medical billing and claims processing machinery. The attack forced Optum to shut down its IT systems, causing widespread disruptions that impacted hospitals, clinics, pharmacies, and ultimately, patients.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:434&quot;&gt;The attack, believed to be perpetrated by a “nation-state” actor, highlights the vulnerabilities of the healthcare industry in the face of sophisticated cyber threats. Optum confirmed the incident in an official filing with the Securities and Exchange Commission, stating that they proactively isolated impacted systems to contain the attack and protect patient data. However, the disruption’s full extent and duration remain unclear.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:477&quot;&gt;The immediate consequences were widespread. Hospitals and clinics struggled to process patient bills and claims, leading to delays in treatment and prescriptions. Pharmacies, particularly local and chain stores, were unable to process insurance claims or accept discount cards, creating significant inconvenience for patients. The American Hospital Association issued a stark warning, urging healthcare organizations to disconnect from Optum until its systems were deemed safe.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:446&quot;&gt;The potential for a ransomware attack looms large, with the possibility of patient and corporate data being stolen and held for ransom. While the investigation continues, the incident raises critical questions about data security and preparedness within the healthcare industry. The reliance on centralized platforms like Change Healthcare underscores the need for robust cybersecurity measures and contingency plans to mitigate such disruptions.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:446&quot;&gt;The investigation into the cyberattack is ongoing, with authorities yet to disclose the full extent of the damage. However, the initial impact has been significant, highlighting the vulnerabilities within the US healthcare system’s digital infrastructure. This incident underscores the need for robust cybersecurity measures and contingency plans to ensure the continued functionality of critical healthcare services in the face of such threats.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Healthcare-billing-disruption-caused-by-Optum-hack.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Healthcare billing disruption caused by Optum hack]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Healthcare-billing-disruption-caused-by-Optum-hack.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Leaked documents expose China’s cyber espionage network</title>
		<link>https://www.businessupturn.com/technology/cyber-security/leaked-documents-expose-chinas-cyber-espionage-network/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Fri, 23 Feb 2024 16:44:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Vigilance]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=402350</guid>

					<description><![CDATA[A massive leak of data from I-Soon, a Chinese tech security firm, has exposed details of China&apos;s cyber espionage operations.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:415&quot;&gt;The revelation of a massive data leak from I-Soon, a Chinese tech security firm deeply intertwined with the country’s government agencies. This unprecedented breach offered a startling glimpse into the inner workings of China’s cyber espionage apparatus, raising serious concerns about global security and the extent of state-sponsored hacking activities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:403&quot;&gt;The leaked data, encompassing contracts, marketing materials, product manuals, and personnel lists, painted a disturbing picture of I-Soon’s involvement in a wide range of activities. From large-scale surveillance of overseas dissidents to targeted hacking campaigns against foreign nations, the documents laid bare the methods employed by Chinese authorities to exert influence and gather intelligence.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:476&quot;&gt;One particularly concerning aspect of the leak was the revelation of I-Soon’s role in hacking networks across Central and Southeast Asia, as well as Hong Kong and Taiwan. The leaked documents detailed sophisticated tools used to unmask users on social media platforms, infiltrate email accounts, and mask the online activities of Chinese agents operating abroad. This ability to operate with near impunity highlights the sophistication and reach of China’s cyber capabilities.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:467&quot;&gt;Furthermore, the leak shed light on the competitive landscape of state-sponsored hacking. Documents revealed how government targeting requirements fueled a marketplace of independent contractor hackers-for-hire, with I-Soon acting as a key player in this ecosystem. This revelation underscores the potential for such activities to become increasingly decentralized and difficult to track, posing a significant challenge for international efforts to combat cybercrime.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:555&quot;&gt;The impact of this leak is multifaceted. On one hand, it has severely damaged I-Soon’s reputation, exposing the company’s close ties to the Chinese government and raising ethical questions about its activities. On another hand, it has provided invaluable insights for the cybersecurity community, offering a rare opportunity to understand the inner workings of a state-affiliated hacking contractor. This knowledge can be used to improve attribution efforts, develop more effective defence strategies, and raise awareness of the evolving threat landscape.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:555&quot;&gt;The source of the leak remains unknown. Regardless of its origin, the leak has sparked a global conversation about the ethical implications of state-sponsored hacking and the need for international cooperation to address this growing threat. While the investigation into the leak’s authenticity continues, its credibility has been widely acknowledged by cybersecurity experts, further amplifying its significance.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Leaked-documents-expose-Chinas-cyber-espionage-network.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Leaked documents expose China’s cyber espionage network]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Leaked-documents-expose-Chinas-cyber-espionage-network.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>China’s cyber defenses shaken by iSoon leak and APT ttacks</title>
		<link>https://www.businessupturn.com/technology/cyber-security/chinas-cyber-defenses-shaken-by-isoon-leak-and-apt-ttacks/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Tue, 20 Feb 2024 04:19:54 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=400623</guid>

					<description><![CDATA[The breach and attacks signal a paradigm shift in cyber warfare and pose multifaceted threats to China&apos;s national security and technological advancements.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;A major data breach at iSoon, a company with close ties to China’s Ministry of Public Security (MPS), has exposed sensitive information about the nation’s espionage operations and spyware tools. This revelation, coupled with a significant rise in cyberattacks targeting critical sectors, has sparked concerns about the effectiveness of China’s cybersecurity defenses.&lt;/p&gt;
&lt;p&gt;The leaked data, a treasure trove of classified documents dumped on GitHub, laid bare the inner workings of China’s clandestine operations. From the mechanics of state-sponsored spyware to detailed accounts of espionage missions, the leak mirrored the infamous NTC Vulkan breach, exposing a web of vulnerabilities within the systems safeguarding China’s most guarded secrets.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:647&quot;&gt;A recent cybersecurity report reveals a staggering rise in APT attacks targeting the nation in 2023. Over 1,200 incursions, orchestrated by 13 foreign entities, targeted 16 critical sectors, with the education sector bearing the brunt of the attacks. These attacks, primarily originating from North America and Asia, signify a shift beyond mere espionage. The focus on infrastructure, particularly the tech sector, hints at a strategic intent to cripple China’s technological advancements, potentially hindering its economic and geopolitical ambitions.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:704&quot;&gt;The implications of the iSoon breach and the surge in APT attacks extend far beyond the immediate loss of data. They expose a critical vulnerability in China’s cybersecurity armor, raising questions about the effectiveness of its defense mechanisms. The exposure of sensitive information through the breach transcends mere operational compromise; it signifies a potential paradigm shift in how cyber warfare is waged, blurring the lines between espionage and open conflict. Moreover, the targeted attacks on education and technology raise concerns about stifling innovation and eroding China’s competitive edge, highlighting the multifaceted threats posed by cyber incursions in the interconnected world.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:718&quot;&gt;In conclusion, the iSoon breach and the escalating APT attacks serve as a stark reminder of the precarious nature of cyber security in the digital age. As espionage and warfare evolve in the virtual realm, the incident underscores the perpetual arms race in cyberspace, where vulnerabilities are exploited and defenses are constantly tested.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:718&quot;&gt;The ramifications of such breaches and attacks reverberate far beyond the immediate loss of data, posing existential questions about the future of cyber sovereignty and the global order.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Chinas-cyber-defenses-shaken-by-iSoon-leak-and-APT-ttacks.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[China’s cyber defenses shaken by iSoon leak and APT ttacks]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Chinas-cyber-defenses-shaken-by-iSoon-leak-and-APT-ttacks.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>North Korea’s cyber army plunders billions in virtual currency</title>
		<link>https://www.businessupturn.com/technology/cyber-security/north-koreas-cyber-army-plunders-billions-in-virtual-currency/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Sat, 17 Feb 2024 14:35:12 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=399773</guid>

					<description><![CDATA[North Korean hackers steal billions in virtual currency to fund nuclear programs, highlighting the need for stricter regulations, international cooperation, and enhanced cyber defenses.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Within the digital world, a group known as Andariel, a North Korean hacker unit, alongside others like Kimsuky, Lazarus, and BlueNoroff, has become notorious for its focus on financial cybercrime. Their recent exploits, however, have shed light on a larger, more troubling trend: North Korea’s growing reliance on virtual currency theft to fund its nuclear weapons of mass destruction (WMD) programs.&lt;/p&gt;
&lt;p&gt;News of Andariel’s breach of South Korean defence firms, stealing 1.2 terabytes of sensitive data, was just the tip of the iceberg. A recent report by the U.S. Department of the Treasury reveals a more alarming reality: North Korean cybercriminals have allegedly amassed a staggering $1.7 billion in virtual assets through cyber thefts in 2022 alone, exceeding any previous year. This brings the total stolen over the past three years to a staggering $3.129 billion.&lt;/p&gt;
&lt;p&gt;According to the report, North Korean cyber criminals amassed a staggering $1.7 billion in virtual assets through cyber theft in 2022 alone, exceeding any previous year. This brings the total stolen over the past three years to a staggering $3.129 billion. This illicit activity takes various forms, including ransomware attacks, hacks on virtual asset service providers (VASPs), and even the deployment of IT experts overseas who operate under assumed identities to secure contracts on digital platforms.&lt;/p&gt;
&lt;p&gt;No longer content with isolated attacks, they are now building a network of international collaborators, with evidence suggesting ties to Russian cybercriminals who provide haven and support. This collaboration raises the spectre of even more sophisticated and coordinated attacks in the future.&lt;/p&gt;
&lt;p&gt;The vulnerability of virtual assets plays a crucial role in North Korea’s success. The rapid growth of the cryptocurrency market, coupled with a lack of robust regulations, creates a fertile ground for exploitation. Hackers capitalize on weak security measures and the anonymity offered by certain platforms to steal and launder funds with relative ease.&lt;/p&gt;
&lt;p&gt;This growing threat has not gone unnoticed by the international community. The United Nations Security Council has imposed sanctions on North Korea since 2006, and a trilateral effort by South Korea, the United States, and Japan aims to curb virtual asset theft. However, these efforts have been met with adaptation by North Korean hackers, who operate from foreign shores and meticulously mask their identities.&lt;/p&gt;
&lt;p&gt;With billions already stolen and North Korea’s nuclear ambitions unabated, the international community must act swiftly. Strategies like enhanced cyber security measures, stricter regulations for virtual asset markets, and closer international cooperation are crucial to dismantle North Korea’s cybercrime network and prevent further funding of its WMD programs.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/North-Koreas-cyber-army-plunders-billions-in-virtual-currency.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[North Korea’s cyber army plunders billions in virtual currency]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/North-Koreas-cyber-army-plunders-billions-in-virtual-currency.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Meet the top 5 Indian hackers</title>
		<link>https://www.businessupturn.com/technology/cyber-security/meet-the-top-5-indian-hackers/</link>
		
		<dc:creator><![CDATA[Siddharth Chavan]]></dc:creator>
		<pubDate>Sun, 19 Nov 2023 15:48:09 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=373879</guid>

					<description><![CDATA[The Emergence and Growth of Indian Hackers.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;India has become recognized for its abundance of tech talent and cybersecurity expertise, making significant global contributions in the realm of hacking. Various factors contribute to the success of Indian hackers.&lt;/p&gt;
&lt;p&gt;Let’s explore notable figures in Indian hacking:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A. Hacker 1: Ankit Fadia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Ankit Fadia is a young Indian ethical hacker, author, and cybersecurity consultant known for his contributions to cybersecurity.&lt;/p&gt;
&lt;p&gt;Notable achievements:&lt;/p&gt;
&lt;p&gt;Ankit Fadia is the author of several books on ethical hacking, cybersecurity, and basic computer expertise, including “The Unofficial Guide to Ethical Hacking,” “Network Security: A Hacker’s Perspective,” and “How to Unblock Everything on the Internet.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;B.&lt;/strong&gt; &lt;strong&gt;Hacker 2: Rahul Tyagi&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Rahul Tyagi is a prominent figure in cybersecurity, recognized for his ethical hacking skills and contributions to the sector.&lt;/p&gt;
&lt;p&gt;Notable accomplishments:&lt;/p&gt;
&lt;p&gt;Rahul Tyagi is a prolific author with well-received publications on ethical hacking, cybersecurity methods, and computer expertise. Titles like “Mastering Cyber Security” and “Securing Mobile Payments” showcase his dedication to disseminating valuable information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;C. Hacker 3: Saket Modi&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Saket Modi is a well-known figure in the cybersecurity field, achieving success as an ethical hacker, author, and cybersecurity consultant.&lt;/p&gt;
&lt;p&gt;Notable achievements:&lt;/p&gt;
&lt;p&gt;Saket Modi has made significant contributions through his prolific authorship, producing recognized publications on ethical hacking, cybersecurity, and general computer skills. Titles like “Mastering Cyber Threat Intelligence” and “Securing the Digital World” demonstrate his commitment to educating individuals in the field of cybersecurity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;D. Hacker 4: Sunny Vaghela&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Sunny Vaghela is a notable figure in the cybersecurity sector, renowned for his ethical hacking skills and contributions.&lt;/p&gt;
&lt;p&gt;Notable achievements:&lt;/p&gt;
&lt;p&gt;Sunny Vaghela, a prolific writer, has enriched the cybersecurity sector with well-received books covering ethical hacking approaches, advanced cybersecurity strategies, and comprehensive computer knowledge. Titles like “Mastery in Ethical Hacking” and “Securing the Digital Frontier” highlight Vaghela’s commitment to distributing vital information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;E. Hacker 5: Trishneet Arora&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Trishneet Arora is praised for his ethical hacking abilities and significant contributions to the cybersecurity field.&lt;/p&gt;
&lt;p&gt;Notable achievements:&lt;/p&gt;
&lt;p&gt;Trishneet Arora, a prolific author, has expanded the cybersecurity sector with well-received books exploring ethical hacking tactics, innovative cybersecurity strategies, and in-depth computer knowledge. Titles like “Mastering Cyber Defense” and “Innovations in Mobile Security” attest to Arora’s commitment to distributing vital information.&lt;/p&gt;
&lt;p&gt;A Vision for the Future: Advancements in Ethical Hacking&lt;/p&gt;
&lt;p&gt;Exploring Ethical Hacking Advancements and Developments:&lt;/p&gt;
&lt;p&gt;1. Specialization and Expertise: Indian hackers are likely to contribute to the further specialization of ethical hacking, gaining competence in areas such as IoT security, cloud security, and blockchain as the sector expands.&lt;/p&gt;
&lt;p&gt;2. Integration of Artificial Intelligence and Machine Learning: Integrating AI and ML into ethical hacking tools is a promising path, and Indian hackers, with their strong technical backgrounds, may play a critical role in improving these technologies for enhanced vulnerability assessments, threat detection, and incident response.&lt;/p&gt;
&lt;p&gt;The future of ethical hacking, influenced by Indian hackers, promises advances in specialization, technology integration, and worldwide collaboration. Opportunities for legal clarity, skill development, and global leadership will be met with challenges, establishing Indian hackers as vital contributors to the continued evolution of cybersecurity practices.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2023/11/1.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Meet the top 5 Indian hackers]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2023/11/1.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>India’s Biggest Data Leak! Aadhaar data of 81.5 Cr Indians leaked on dark web, claims report</title>
		<link>https://www.businessupturn.com/nation/indias-biggest-data-leak-aadhaar-data-of-81-5-cr-indians-leaked-on-dark-web-claims-report/</link>
		
		<dc:creator><![CDATA[Uddeshya Thakur]]></dc:creator>
		<pubDate>Tue, 31 Oct 2023 17:12:17 +0000</pubDate>
				<category><![CDATA[Nation]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=368483</guid>

					<description><![CDATA[According to the report, data including name, phone number, address, Aadhaar, passport information is available for sale online.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;The biggest data leak so far has come to light in the country. The data of 81.5 crore Indians available with the Indian Council of Medical Research (ICMR) has been leaked. According to a report by US-based cybersecurity firm Resecurity, personally identifiable information of about 815 million i.e. 81.5 crore Indians has been leaked on the dark web.&lt;/p&gt;
&lt;p&gt;According to the report, data including name, phone number, address, Aadhaar, passport information is available for sale online. “On October 9, a thread actor identified as ‘pwn0001’ posted a thread on the breach forum showing access to 815 million ‘Indian Citizen Aadhaar and Passport’ records,” Resecurity wrote in a blogpost.&lt;/p&gt;
&lt;blockquote class=&quot;twitter-tweet&quot; data-width=&quot;550&quot; data-dnt=&quot;true&quot;&gt;
&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;⚠️ India Biggest Data Breach&lt;/p&gt;
&lt;p&gt;Unknown hackers have leaked the personal data of over 800 million Indians Of COVID 19.&lt;/p&gt;
&lt;p&gt;The leaked data includes:&lt;/p&gt;
&lt;p&gt;* Name&lt;br /&gt;* Father&apos;s name&lt;br /&gt;* Phone number&lt;br /&gt;* Other number&lt;br /&gt;* Passport number&lt;br /&gt;* Aadhaar number&lt;br /&gt;* Age&lt;a href=&quot;https://twitter.com/hashtag/DataBreach?src=hash&amp;ref_src=twsrc%5Etfw&quot;&gt;#DataBreach&lt;/a&gt;  &lt;a href=&quot;https://twitter.com/hashtag/dataleak?src=hash&amp;ref_src=twsrc%5Etfw&quot;&gt;#dataleak&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/CyberSecurity?src=hash&amp;ref_src=twsrc%5Etfw&quot;&gt;#CyberSecurity&lt;/a&gt; &lt;a href=&quot;https://t.co/lUaJS9ZPDr&quot;&gt;pic.twitter.com/lUaJS9ZPDr&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Shivam Kumar Singh (@MrRajputHacker) &lt;a href=&quot;https://twitter.com/MrRajputHacker/status/1719017620278784504?ref_src=twsrc%5Etfw&quot;&gt;October 30, 2023&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;script async src=&quot;https://platform.twitter.com/widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;&lt;/p&gt;
&lt;p&gt;The company also said that investigators from its HUMINT unit, who contacted the thread actor, learned that they were willing to sell the entire Aadhaar and Indian passport database for $80,000. ICMR is aware of this data leak.&lt;/p&gt;
&lt;p&gt;Sources confirmed to News18 that the epicentre of leakage has not been identified as parts of the Covid-19 test data go to the National Informatics Centre (NIC), ICMR and Ministry of Health.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2023/10/Ashok-2023-10-31T223936.636.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[India’s Biggest Data Leak! Aadhaar data of 81.5 Cr Indians leaked on dark web, claims report]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2023/10/Ashok-2023-10-31T223936.636.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Russian Missile maker faces breach in the hands of North Korean hackers</title>
		<link>https://www.businessupturn.com/world/russian-missile-maker-faces-breach-in-the-hands-of-north-korean-hackers/</link>
		
		<dc:creator><![CDATA[Kashvi Basu]]></dc:creator>
		<pubDate>Mon, 07 Aug 2023 15:53:31 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[World]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[North Korea]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=341502</guid>

					<description><![CDATA[A well known group of North Korean hackers have secretly breached computer networks at a major Russian missile developer for...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;A well known group of North Korean hackers have secretly breached computer networks at a major Russian missile developer for at least a period of five months last year according to all technical evidences collected and further reviewed by Reuters and analysis by security researchers.&lt;/p&gt;
&lt;p&gt;It has been discovered that the cyber-espionage teams linked to the North Korean government, which security researchers call ScarCruft and Lazarus, secretly installed stealthy digital backdoors into systems at NPO Mashinostroyeniya, a rocket design bureau based in Reutov, a small town on the outskirts of Moscow. In the months following the digital break-in ,Pyongyang had announced multiple developments in its banned ballistic missile programme but it was not deemed clear if this was related to the breach. Experts have commented that the incident shows how the isolated country will even target its allies, such as Russia, in a bid to acquire critical technologies. News of the hack had surfaced shortly after a trip to Pyongyang last month by Russian defence minister Sergei Shoigu for the 70th anniversary of the Korean War; the first visit by a Russian defence minister to North Korea since the 1991 breakup of the Soviet Union. The targeted company which is commonly known as NPO Mash, has acted as a pioneer developer of hypersonic missiles, satellite technologies and newer generation ballistic armaments, according to missile experts – three areas of keen interest to North Korea since it embarked on its mission to create an Intercontinental Ballistic Missile (ICBM) capable of striking the mainland United States.&lt;/p&gt;
&lt;p&gt;After consulting the data, it was found that the intrusion roughly began in late 2021 and continued until May 2022 when, according to internal communications at the company reviewed by Reuters, IT engineers had already detected the hackers’ activity. NPO Mash thus grew to prominence during the Cold War as a premier satellite maker for Russia’s space programme and as a provider of cruise missiles&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2023/08/Untitled-design-2023-08-07T194050.454.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Russian Missile maker faces breach in the hands of North Korean hackers]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2023/08/Untitled-design-2023-08-07T194050.454.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Karnataka Police seizes Bitcoins worth Rs 9 crore from a Bengaluru hacker</title>
		<link>https://www.businessupturn.com/nation/crime/karnataka-police-seizes-bitcoins-worth-rs-9-crore-from-a-bengaluru-hacker/</link>
		
		<dc:creator><![CDATA[Devanshu Singla]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 07:34:59 +0000</pubDate>
				<category><![CDATA[Crime]]></category>
		<category><![CDATA[Bengaluru]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Bitcoin Scam]]></category>
		<category><![CDATA[crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Karnataka]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=85601</guid>

					<description><![CDATA[Sandeep Patil, Bengaluru Joint Commissioner of Police (Crime) on Friday informed that Karnataka Police has seized Bitcoins worth Rs 9...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Sandeep Patil, Bengaluru Joint Commissioner of Police (Crime) on Friday informed that Karnataka Police has seized Bitcoins worth Rs 9 crore from Bengaluru based 25-year old hacker.&lt;/p&gt;
&lt;p&gt;The hacker, Srikrishna alias Shreeki, was arrested on November 18 for allegedly breaking into government websites, online gaming portals and websites.&lt;/p&gt;
&lt;p&gt;“During the investigation, it has been found that hacker Srikrishna hacked three Bitcoin exchanges and 10 poker sites. Bitcoins worth &lt;span class=&quot;webrupee&quot;&gt;₹&lt;/span&gt;9 crores have been seized in this matter,” Patil said.&lt;/p&gt;
&lt;p&gt;Srikrishna used to hack online poker games to win money and Bitcoins online. He also confessed to hacking the e-procurement website of the Karnataka Government in 2019.&lt;/p&gt;
&lt;p&gt;The hacker’s handiwork includes four hacked websites and three malware exploited.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2021/01/bitcoins.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Karnataka Police seizes Bitcoins worth Rs 9 crore from a Bengaluru hacker]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2021/01/bitcoins.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Top 5 Indian Hackers ensuring cyber security</title>
		<link>https://www.businessupturn.com/people/top-5-indian-hackers-ensuring-cyber-security/</link>
		
		<dc:creator><![CDATA[Sanket Kate]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 15:42:03 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Features]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=40602</guid>

					<description><![CDATA[Hacking is always linked with something illegal with a breach of privacy. But ethical hacker or white hat hackers direct...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Hacking is always linked with something illegal with a breach of privacy. But ethical hacker or white hat hackers direct their skills for some good cause like finding security bugs. It requires expertise, concentration and indeed the most brilliant of minds to breach into systems silently overruling all their top-notch salient manifestations. Hacking is supposed to be the toughest and coolest task among those who understands technology. The best hackers indeed are the ones who build up this acumen to breach security again and again, so that they can guard the interest of millions of users to which these cyber systems cater.&lt;/p&gt;
&lt;p&gt;Here are some of such top 5 hackers in India  who are sought after by people even around the world.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1. Vivek Ramachandran&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img fetchpriority=&quot;high&quot; decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-40604&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/a-5.jpg&quot; alt=&quot;&quot; width=&quot;190&quot; height=&quot;265&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Vivek Ramachandran has already made a name for himself. He has won accolades and awards for his work from both Cisco and Microsoft. Vivek specializes in several systems including e-governance, embedded systems security, computer forensics, and wireless security.&lt;br /&gt;
One of the 2006 winners of the Microsoft Security Shootout Contest, Ramachandran is the founder of SecurityTube.net, a free video-based computer security educational portal. Cisco Systems also awarded Vivek the Team Achievement Award for his contribution to the Port security modules in a certain model.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2. Ankit Fadia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-40606&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/b-7-300x227.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;227&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/b-7-300x227.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/b-7.jpg 529w&quot; sizes=&quot;(max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Ankit Fadia is an Indian author, speaker, television host, and self-proclaimed “BLACK HAT hacker” of computer systems, whose skills and ethics have been debated. His work mostly involves OS and networking-based tips and tricks, proxy websites, and making people think that he is a hacker. Ankit Fadia’s range of skills that grant him easy access to the critical domains of computers and the like have very often been debated and scrutinised.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3. Rahul Tyagi&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-40607&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/c-7.jpg&quot; alt=&quot;&quot; width=&quot;204&quot; height=&quot;204&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/c-7.jpg 204w, https://www.businessupturn.com/wp-content/uploads/2020/08/c-7-150x150.jpg 150w&quot; sizes=&quot;(max-width: 204px) 100vw, 204px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Rahul Tyagi is a talented hacker who has proved himself several times by entering and breaking into secure computer systems. You will also want to know that he is an actor and also an author. He had provided more than several hundred training sessions on hacking. He completed his education from LPU, Punjab. An expert in cyber security training, Tyagi is one of the leading ethical hacking trainers of the country with a decade of expertise backing him up. His hacking forte has led him to emerge as a skilled dealer of vulnerabilities on websites that are reputed and harbour immense confidentiality.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;4. Trishneet Arora&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-40608&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/d-5-300x225.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;225&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/d-5-300x225.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/d-5-900x675.jpg 900w, https://www.businessupturn.com/wp-content/uploads/2020/08/d-5-768x576.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/d-5.jpg 1200w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Arora is an entrepreneur who found a Cyber Security company that provides protection to corporations against data theft and network vulnerabilities. Few of his clients are Central Bureau of Investigation, Reliance Industries, Gujrat Police and Punjab Police. Arora has written books on cybersecurity, ethical hacking, and web defence. He was named in Forbes 30 Under 30 2018 Asia list and Fortune 40 Under 40 2019 List of India’s Brightest.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5. Sai Satish&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-40609&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/e-4-300x300.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;300&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/e-4-300x300.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/e-4-150x150.jpg 150w, https://www.businessupturn.com/wp-content/uploads/2020/08/e-4.jpg 400w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Sai Satish is an young entrepreneur, founder &amp; CEO of Indian Servers. Administrator of Andhrahackers (Top hacking awareness forum in INDIA). An Author, A renewed Ethical Hacker &amp; Cyber Security Expert, Microsoft Security Researcher, International Cyber Security trainer. Satish was rewarded by IAS Officer for pentesting on government sites, which gave him huge exposure and helped them to improve security, Forensics Investigator and safe transaction.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2020/08/hackers-1.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Top 5 Indian Hackers ensuring cyber security]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2020/08/hackers-1.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>7 Must watch hacking movies of all times</title>
		<link>https://www.businessupturn.com/entertainment/movies/7-must-watch-hacking-movies-of-all-times/</link>
		
		<dc:creator><![CDATA[Sanket Kate]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 17:56:33 +0000</pubDate>
				<category><![CDATA[Features]]></category>
		<category><![CDATA[Movies]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[movies]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=38825</guid>

					<description><![CDATA[Sci-Fi movies gaining popularity with advent of ultra-sophisticated technology now a days. New movies are couple story with modern technology....]]></description>
										<content:encoded><![CDATA[&lt;p&gt;Sci-Fi movies gaining popularity with advent of ultra-sophisticated technology now a days. New movies are couple story with modern technology. Such a new movies getting more viewership and enchanting more and more technologically equipped youth. Misuse of technology by intelligent means of hacking is common villain trait to compel hero fight against such people. The real world of cyber security may not be as action-packed as the Hollywood version, but you may be surprised at the number of similarities between hacker movies and what goes on in the real world. New animation techniques and intelligent direction makes possible to give amazing experience to viewers. In recent decade many movies able to attract attention of audience and earned accolades and acclaims for fantastic visualization of the technological advances.&lt;/p&gt;
&lt;h1&gt;Here we are presenting the list of &lt;a href=&quot;https://www.businessupturn.com/?p=38825&amp;preview=true&quot;&gt;top 7 hacking movies&lt;/a&gt; which grabbed public attention.&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;1. Ghost In The Shell&lt;/strong&gt;&lt;br /&gt;
Based on the manga of the same name, Ghost In The Shell is popular, animated science fiction film. It shows how a cyborg policewoman and her partner hunt a powerful hacker named Puppet Master. Considered one of the best anime movies of all time, this story shows an interesting take on the hackers in movies and comes loaded with dense philosophical themes.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-38826&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/gin.jpg&quot; alt=&quot;&quot; width=&quot;297&quot; height=&quot;169&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2. Office Space&lt;/strong&gt;&lt;br /&gt;
This is a classic comedy movie that has a small aspect of hacking. In the movie, company employees plant a virus in the accounting system with the goal of stealing some money. This movie became much popular and earned accolades and acclaims widely.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38827&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/office-space-300x200.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;200&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/office-space-300x200.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/office-space-600x400.jpg 600w, https://www.businessupturn.com/wp-content/uploads/2020/08/office-space.jpg 750w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3. The Matrix&lt;/strong&gt;&lt;br /&gt;
The Matrix is a hacker movie at heart. It features gifted Neo searching for answers, hacking further and further until he realizes the world is the computer program. Like any hacker, he seeks to learn the truth about reality, finding that the world, as he knows it, is no longer and that machines are in charge.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-38828&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/matrix.jpg&quot; alt=&quot;&quot; width=&quot;178&quot; height=&quot;268&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;4. Hackers&lt;/strong&gt;&lt;br /&gt;
Before the days of smartphones and Wi-Fi, the movie Hackers introduced many to the internet. Its plot reflects the ideals of the Hacker Manifesto, which is quoted in the film, “This is our world now…You call us criminals… Yes, I am a criminal. My crime is that of curiosity.”&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38829&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/hackers-300x169.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;169&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/hackers-300x169.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/hackers-768x432.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/hackers-400x225.jpg 400w, https://www.businessupturn.com/wp-content/uploads/2020/08/hackers.jpg 1080w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5. Blackhat&lt;/strong&gt;&lt;br /&gt;
In this story, there are multiple sides to the hacker experience: the villain is the blackhat, the officer has the moral compass, and the red hat has a past of previous crimes but considers himself neither good nor bad. Blackhat opens with a hacker breaching a nuclear plant’s infrastructure, making it explode. The blackhat in this story is like any blackhatter, he’s hacking into systems as a means for monetary gain and attacking others.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38830&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/blackhat-300x250.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;250&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/blackhat-300x250.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/blackhat-810x675.jpg 810w, https://www.businessupturn.com/wp-content/uploads/2020/08/blackhat-768x640.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/blackhat.jpg 1200w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;6. Mr. Robot &lt;/strong&gt;&lt;br /&gt;
Mr. Robot been widely praised for its accurate technical portrayal of information security and data privacy as we know them today. Mr. Robot reveals not only the real implications of data protection and cybersecurity, but also what may be the most technically accurate representation of that community’s everyday life.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38831&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/mr-robot-200x300.jpg&quot; alt=&quot;&quot; width=&quot;200&quot; height=&quot;300&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/mr-robot-200x300.jpg 200w, https://www.businessupturn.com/wp-content/uploads/2020/08/mr-robot-450x675.jpg 450w, https://www.businessupturn.com/wp-content/uploads/2020/08/mr-robot-768x1152.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/mr-robot.jpg 1440w&quot; sizes=&quot;auto, (max-width: 200px) 100vw, 200px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7. Mission: Impossible — Ghost Protocol &lt;/strong&gt;&lt;br /&gt;
This movie is great fun for all the action lovers out there. And its decidedly high-tech hacking scenes make it a highly entertaining hacker movie to watch. The story focuses on Tom Cruise’s Ethan Hunt and the IMF, an organization wrongly accused of an explosion. In the mix is Hendricks, whose access to Russian nuclear launch codes fuels his plans to launch an attack on the US. Promptly, Ghost Protocol is invoked, which means a stop to the IMF.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38832&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/MI-GP-300x153.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;153&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/MI-GP-300x153.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/MI-GP-768x392.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/MI-GP.jpg 1000w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2020/08/hm.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[7 Must watch hacking movies of all times]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2020/08/hm.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>All time top 10 Hacking Attacks</title>
		<link>https://www.businessupturn.com/technology/cyber-security/all-time-top-10-hacking-attacks/</link>
		
		<dc:creator><![CDATA[Sanket Kate]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 19:09:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Features]]></category>
		<category><![CDATA[Cyber attacks]]></category>
		<category><![CDATA[Hacking]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=38497</guid>

					<description><![CDATA[With more and more reliance of human beings on technology for storage of large chunk of data and incessant dealing...]]></description>
										<content:encoded><![CDATA[&lt;p&gt;With more and more reliance of human beings on technology for storage of large chunk of data and incessant dealing with it by sharing transferring and editing, the importance of computer networking rising day by day. When this data is dealt by using internet, which is an open network with no centralised control, there is possibility of compromise in security of data. This is done by various hacking techniques which utilises loopholes in computer system for the purpose of breaching privacy of data. This data most of the time is used to get economic fortunes. Hacking attacks becoming more and more frequent day by day.&lt;/p&gt;
&lt;h1&gt;Here is the list of &lt;a href=&quot;https://www.businessupturn.com/features/all-time-top-10-hacking-attacks/&quot;&gt;top 10 Hacking attacks&lt;/a&gt; in history.&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;1. 2016: Bangladesh Bank Heist&lt;/strong&gt;&lt;br /&gt;
Bangladesh Bank heist was noteworthy for how the attackers got into the bank’s IT systems. The story caused huge concern because the attackers had managed to hack the SWIFT global monetary transfer system, giving them free rein to make withdrawals under the protection of the supposedly hyper-secure SWIFT system. The gang responsible had planned to remove $950 million, before a simple error blew their cover. They ended up making off with $81 million anyway, and have been linked to other attacks on banks across Asia.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38499&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/bd-300x181.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;181&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/bd-300x181.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/bd-768x464.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/bd.jpg 860w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2. 2011: CitiGroup&lt;/strong&gt;&lt;br /&gt;
CitiGroup’s slew security measures exposed in 2011 when hackers by repeating the way the URL changed when credit card customers entered a valid username and password, were able to access the accounts of more than 200,000 people, stealing names, addresses and account numbers, and making off with $2.7 million.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-38500&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/citibank.jpg&quot; alt=&quot;&quot; width=&quot;250&quot; height=&quot;155&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3. 2014: Mt Gox Bitcoin Exchange&lt;/strong&gt;&lt;br /&gt;
The Mt Gox Bitcoin exchange had been bankrupted by the theft of some $460 million worth of Bitcoin currency, probably over a period of several years. Following an investigation, it was discovered that hackers had broken into the Mt Gox customer database, stealing the usernames and passwords of 60,000 people, and using them to get into the system to steal currency.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38501&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/mtgox-300x200.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;200&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/mtgox-300x200.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/mtgox-1013x675.jpg 1013w, https://www.businessupturn.com/wp-content/uploads/2020/08/mtgox-768x512.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/mtgox-600x400.jpg 600w, https://www.businessupturn.com/wp-content/uploads/2020/08/mtgox.jpg 1400w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;4. 2014: Cyberattack on Yahoo&lt;/strong&gt;&lt;br /&gt;
In 2014, Yahoo announced it had suffered a cyber attack in 2014 that affected 500 million user accounts constituting the largest massive hacking of individual data directed against a single company.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38502&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/yahoo-300x131.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;131&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/yahoo-300x131.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/yahoo.jpg 339w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5. 2018: Facebook&lt;/strong&gt;&lt;br /&gt;
On September 27th, Facebook was breached when hackers exploited three bugs that put at least 50 million users’ data at risk. While private messages or credit cards were not taken, Facebook made a statement that the hackers obtained personal information like your name and hometown from your profile page.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-38503&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/fb.jpg&quot; alt=&quot;&quot; width=&quot;292&quot; height=&quot;173&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;6. 2017: WannaCry&lt;/strong&gt;&lt;br /&gt;
The WannaCry attack in May 2017 spread like wildfire by targeting a vulnerability in older versions of Windows OS. Within days, tens of thousands of businesses and organisations across 150 countries, including the UK’s National Health Service (NHS), were locked out of their own systems by WannaCry’s encryption. The attackers demanded $300 per computer to unlock the code.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38504&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/wannacry-300x225.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;225&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/wannacry-300x225.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/wannacry-900x675.jpg 900w, https://www.businessupturn.com/wp-content/uploads/2020/08/wannacry-768x576.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/wannacry.jpg 1200w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;7. 2007: Estonia DDoS&lt;/strong&gt;&lt;br /&gt;
Over a three week period, wave after wave of DDoS attacks in Estonia, hit the servers which ran the country’s government, media, education and banking infrastructure, crippling the economy, public services and daily life. Fingers were pointed towards neighbouring Russia, but no concrete evidence were found.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-full wp-image-38505&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/est.jpg&quot; alt=&quot;&quot; width=&quot;227&quot; height=&quot;222&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;8. 2009: Hacker steals tens of millions of credit card details&lt;/strong&gt;&lt;br /&gt;
Gonzales, a hacker from Miami, was responsible for one of the biggest fraud cases in US history. Gonzales was responsible for sealing tens of millions of credit card and debit card numbers from over 250 financial institutions. He had hacked the payment card network from companies including the 7-Eleven convenient store chain.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38506&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/gonza-300x214.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;214&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/gonza-300x214.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/gonza.jpg 480w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;9. 2019: Dubsmash&lt;/strong&gt;&lt;br /&gt;
In February, video messaging app Dubsmash announced that hackers nabbed nearly 162 million users’ account holder names, email addresses and hashed passwords.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38507&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/Dubsmash-300x169.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;169&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/Dubsmash-300x169.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/Dubsmash-768x432.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/Dubsmash-400x225.jpg 400w, https://www.businessupturn.com/wp-content/uploads/2020/08/Dubsmash.jpg 1200w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;10. 2019: First American&lt;/strong&gt;&lt;br /&gt;
First American Financial Corp., an American real estate and mortgage insurer, revealed in May 2019 that it left 900 million sensitive customer files exposed. The trove of digital documents that could have been accessed included private information, such as Social Security numbers and bank accounts. But it’s not clear if any of the files were improperly accessed.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&quot;lazy&quot; decoding=&quot;async&quot; class=&quot;alignnone size-medium wp-image-38508&quot; src=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/fa-300x200.jpg&quot; alt=&quot;&quot; width=&quot;300&quot; height=&quot;200&quot; srcset=&quot;https://www.businessupturn.com/wp-content/uploads/2020/08/fa-300x200.jpg 300w, https://www.businessupturn.com/wp-content/uploads/2020/08/fa-768x511.jpg 768w, https://www.businessupturn.com/wp-content/uploads/2020/08/fa-600x400.jpg 600w, https://www.businessupturn.com/wp-content/uploads/2020/08/fa.jpg 1000w&quot; sizes=&quot;auto, (max-width: 300px) 100vw, 300px&quot; /&gt;&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2020/08/hacking.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[All time top 10 Hacking Attacks]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2020/08/hacking.jpg" width="1200" height="675" />
	</item>
	</channel>
</rss>
