A Hacker Tried to Poison a Florida City's Water Supply

Around 8 am on Friday morning, an employee of a water treatment plant in the 15,000-person city of Oldsmar, Florida, noticed that his mouse cursor was moving strangely on his computer screen, out of his control, as local police would later tell it.

Wired

Hackers auction alleged stolen Cyberpunk 2077, Witcher source code

Threat actors are auctioning the alleged source code for CD Projekt Red games, including Witcher 3, Thronebreaker, and Cyberpunk 2077, that they state were stolen in a ransomware attack. Yesterday, CD Projekt suffered a ransomware attack where the attackers claim to have stolen unencrypted source code for Cyberpunk 2077, Witcher 3, Gwent, and an unreleased version of Witcher 3.

BleepingComputer

Special Report: U.S. cyberwar strategy stokes fear of blowback

WASHINGTON (Reuters) - Even as the U.S. government confronts rival powers over widespread Internet espionage, it has become the biggest buyer in a burgeoning gray market where hackers and security firms sell tools for breaking into computers.

U.S.

Prosecutors Suspend Government Spyware Used in WhatsApp Phishing Attacks

Do you have information about this case or other companies that provide spyware to governments? We'd love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, Wire/Wickr @lorenzofb, or email lorenzofb@vice.com.

Vice

Dayton's drinking water systems have layers of security to curb hacking, officials say

A cyber attack like one recently attempted in Florida, where a hacker tried to add dangerous levels of chemicals to the drinking water is unlikely to happen in Dayton and some local municipalities because the operation of their treatment plants isn't connected to the internet, city officials said.

dayton-daily-news

Deplatforming the Far-Right Could Accelerate an Extremist Underground

The short-term benefits of deplatforming far-right actors and extremist content presents a paradox in long-term consequences. If the only collective answer to web-fueled extremism is to sweep it into the internet's gutters, and deeper systemic issues are neglected, the far-right's most dangerous elements will likely accelerate.

Paradox

7 Common Microsoft AD Misconfigurations that Adversaries Abuse | CrowdStrike

Once an attacker has obtained initial access within an environment, the adversary will attempt to elevate privileges within the network. Adversaries typically have the goal of obtaining Active Directory Domain Administrator privileges, or, in other words, complete control over the Active Directory domain.

Crowdstrike

North Korean Hackers Accused Of 'Biggest Cryptocurrency Theft Of 2020'-Their Heists Are Now Worth $1.75 Billion

A North Korean hacker crew called Lazarus Group has been accused of carrying out a heist on cryptocurrency exchange KuCoin, dubbed the biggest cryptocurrency theft of last year at $275 million worth of virtual money.

Forbes

How Neurodiversity Can Strengthen Cybersecurity Defense

The cybersecurity skills shortage and workforce gap continue to be of concern to organizations. As they seek to protect digital assets by finding professionals with the right skills, demand remains higher than supply.

Dark Reading

Pro-India hacking group expands mobile malware arsenal - CyberScoop

Written by Shannon Vavra Feb 11, 2021 | CYBERSCOOP A pro-India hacking group has been using two kinds of invasive Android surveillance software to spy on hundreds of victims' cell phones for years, according to Lookout research published Thursday.

CyberScoop