#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
DevSecOps

Cyberbullying | Breaking Cybersecurity News | The Hacker News

Category — Cyberbullying
L1ght Looks to Protect Internet Users from Toxic and Predatory Behavior

L1ght Looks to Protect Internet Users from Toxic and Predatory Behavior

Mar 11, 2020
Cybersecurity has been regarded as a necessity for all computer users, especially today when data breaches and malware attacks have become rampant. However, one of the more overlooked aspects of cybersecurity is the prevention of other forms of cybercrime, such as the spread of harmful content and predatory behavior. Most current discussions on cybersecurity revolve around organizations needing to protect customer data or for individual users to prevent their sensitive data from being intercepted. However, given the prevalence of toxic behavior, it's about time the cybersecurity community also gives internet safety, especially for children and younger users, its due attention. Israel-based startup L1ght aims to curb the spread of bad behavior online. It uses artificial intelligence (AI) and machine learning (ML) to detect harmful content, hate speech, bullying, and other predatory behavior in social networks, communication applications, and online video games. The firm ...
Malware can increase Cyberbullying rate by Stealing your Images

Malware can increase Cyberbullying rate by Stealing your Images

Nov 03, 2012
A few week ago, we have seen a major example of Cyberbullying , where a 15-year-old girl ' Amanda Todd '  to kill herself. The Internet can be a dangerous place for the young, exposing them to e-threats such as malware, phishing schemes, pornography or material promoting the use of drugs and violence, among others. In order to keep your kids safe, you'll need to know about the different types of online dangers that are out there. Researchers from  TrendMicro found a malware that steals images from your hard drives of an affected system and able to upload them to a remote FTP server . Malware specifically look for all .JPG, .JPEG, and .DMP files in the storage. Once your system will connect to internet, malware will upload first 20,000 files to the FTP server. " Information theft routines have been mostly limited to information that are in text form, thus this malware poses a whole new different risk for users. " The internet is a very useful too...
SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

Mar 17, 2025Cloud Security / Threat Intelligence
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider's storage security controls and default settings. "In just the past few months, I have witnessed two different methods for executing a ransomware attack using nothing but legitimate cloud security features," warns Brandon Evans, security consultant and SANS Certified Instructor. Halcyon disclosed an attack campaign that leveraged one of Amazon S3's native encryption mechanisms, SSE-C, to encrypt each of the target buckets. A few months prior, security consultant Chris Farris demonstrated how attackers could perform a similar attack using a different AWS security feature, KMS keys with external key material, using simple scripts generated by ChatGPT. "Clearly, this topic is top-of-mind for both threat actors and ...
Cybersecurity
Expert Insights / Articles Videos
Cybersecurity Resources