a little teapot, short and stout

Lapsus$ Jury Says Teen Duo Did Do Crimes

Arion Kurtaj and anon minor: Part of group that hacked Uber, Nvidia, Microsoft, Rockstar Games and many more ...
Security Boulevard
What We Know About The Grand Theft Auto VI Data Breach

What We Know About The Grand Theft Auto VI Data Breach

On September 18, a cyber threat actor named “teapotuberhacker” posted on GTAForums.com claiming to have hacked Rockstar Games, the creator of the popular and controversial Grand Theft Auto (GTA) series. The post ...
DEA Investigating Breach of Law Enforcement Data Portal

DEA Investigating Breach of Law Enforcement Data Portal

The U.S. Drug Enforcement Administration (DEA) says it is investigating reports that hackers gained unauthorized access to an agency portal that taps into 16 different federal law enforcement databases. KrebsOnSecurity has learned ...
AI, defense, cybersecurity,

Five Security Lessons From the Lapsus$ Attacks

Threat groups like Lapsus$ are increasingly targeting the blind spots in otherwise robust corporate cybersecurity programs ...
Security Boulevard
Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month ...
The Original APT: Advanced Persistent Teenagers

The Original APT: Advanced Persistent Teenagers

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection ...
Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of ...
Hi-jacking Internet With A Pringles Can | Mr. Robot

Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”

There is a terrifying and highly effective "method" that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising ...
LAPSUS$ Hacks Okta, Browser-in-the Browser Phishing Attack, Software Package Wipe's Russian Systems

LAPSUS$ Hacks Okta, Browser-in-the Browser Phishing Attack, Popular Software Package Updated to Wipe Russian Systems

The LAPSUS$ hacking group has claimed to have hacked both Microsoft and Okta, details about a novel phishing technique called a browser-in-the-browser (BitB) attack, and how a popular software package that has ...