#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

government computers hacking | Breaking Cybersecurity News | The Hacker News

Unprotected Government Server Exposes Years of FBI Investigations

Unprotected Government Server Exposes Years of FBI Investigations
Jan 17, 2019
A massive government data belonging to the Oklahoma Department of Securities (ODS) was left unsecured on a storage server for at least a week, exposing a whopping 3 terabytes of data containing millions of sensitive files. The unsecured storage server, discovered by Greg Pollock , a researcher with cybersecurity firm UpGuard, also contained decades worth of confidential case files from the Oklahoma Securities Commission and many sensitive FBI investigations—all wide open and accessible to anyone without any password. Other severe files exposed included emails, social security numbers, names, and addresses of 10,000 brokers, credentials for remote access to ODS workstations, and communications meant for the Oklahoma Securities Commission, along with a list of identifiable information related to AIDS patients. While the researcher doesn't know exactly how long the server was open to the public, the Shodan search engine revealed that the server had been publicly open since at

OPM Temporarily Shuts Down Background Check App to Fix Security Hole

OPM Temporarily Shuts Down Background Check App to Fix Security Hole
Jun 30, 2015
The web gateway used to render materials for Federal Background Investigations for employees and contractors has been shut down for several weeks after a vulnerability was detected, the Office of Personnel Management announced. The agency announced the shut down citing the discovery of a vulnerability in its Electronic Questionnaires for Investigations Processing (E-QIP) system while conducting an internal review of the agency's security. As a result, OPM has temporarily suspended the E-QIP system for four to six weeks, and OPM Director Katherine Archuleta said the system would remain offline "until stronger security enhancements are implemented." In the Wake of Massive Breach Although the agency stressed that it had not detected any malicious activity or evidence of hackers actually exploiting the flaw. The internal review of the agency's information technology systems was ordered by Archuleta in the wake of massive cyber attacks on the OPM&

Network Threats: A Step-by-Step Attack Demonstration

Network Threats: A Step-by-Step Attack Demonstration
Apr 25, 2024Endpoint Security / Cyber Security
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit edge-case vulnerabilities. Instead, they often use commonly available tools and exploit multiple vulnerability points. By simulating a real-world network attack, security teams can test their detection systems, ensure they have multiple choke points in place, and demonstrate the value of networking security to leadership. In this article, we demonstrate a real-life attack that could easily occur in many systems. The attack simulation was developed based on the MITRE ATT&CK framework, Atomic Red Team,  Cato Networks ' experience in the field, and public threat intel. In the end, we explain why a holistic secur
Cybersecurity Resources