Archive for the ‘Hacking’ Category

A cracked copy of Brute Ratel post-exploitation tool leaked on hacking forums

The Brute Ratel post-exploitation toolkit has been cracked and now is available in the underground hacking and cybercrime communities. Threat actors have cracked the Brute Ratel C4 (BRC4) post-exploitation toolkit and leaked it for free in the cybercrime underground. The availability of the cracked version of the tool was first reported by the cybersecurity researcher Will Thomas (@BushidoToken), […]

Leave a Comment

New WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control Remotely

WhatsApp silently fixed two critical zero-day vulnerabilities that affect both Android & iOS versions allowing attackers to execute an arbitrary code remotely. Facebook-owned messenger WhatsApp is one of the Top-ranked Messenger apps with more than Billion users around the world in both Android and iPhone. Both vulnerabilities are marked under “critical” severity with a CVE […]

Leave a Comment

Hacking a powered-off iPhone: vulnerabilities never sleep

Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible. Researchers from the Secure Mobile Networking Lab at the University of Darmstadt, Germany, have published a paper describing a theoretical method for hacking an iPhone — even if the device is off. The study examined the […]

Leave a Comment

Deep Insert – An ATM Skimmer Let Hackers Clone ATM Card & Steal 4-Digit PIN

It has been reported that in New York City a number of financial institutions are facing an outburst of super-thin skimming devices known as “deep inserts”. In this type of skimming device, the card is inserted into the mouth of a slot on the ATM that accepts cards. As a clever disguise, the card skimmers […]

Leave a Comment

5 Kali Linux books you should read this year

Advanced Security Testing with Kali Linux Independently published / Author: Daniel Dieterle This book covers the more intermediate and advanced uses of the Kali Linux pentesting distribution. You will learn topics like: The MITRE ATT@CK Framework Command & Control (C2) frameworks In-depth network scanning Web app pentesting Advanced techniques like “Living off the Land” AV […]

Leave a Comment

Programming, software development, ISO27k and AWS online courses

Find programming and software development online courses, created by experts to help you take your career to the next level. Programming Online Courses AWS Online Courses You can choose the course based on your specific needs: ISO 27001 Foundations course – you’ll learn about all of the standard’s requirements and the best practices for compliance. ISO […]

Comments (1)

Hacker tournament brings together world’s best in Las Vegas

(Reuters) – A team of hackers from two North American universities won the “Capture the Flag” championship, a contest seen as the “Olympics of hacking,” which draws together some of the world’s best in the field. In the carpeted ballroom of one of the largest casinos in Las Vegas, the few dozen hackers competing in […]

Comments (1)

Experts warn of hacker claiming access to 50 U.S. companies through breached MSP

Experts warn of hacker claiming access to 50 U.S. companies through breached MSP Cybersecurity experts are raising concerns about an individual on a hacker forum claiming to have access to 50 American companies through an unnamed managed service provider (MSP). MSPs are paid to manage IT infrastructure and provide support, typically by smaller organizations lacking […]

Leave a Comment

Hackers for Hire: Adversaries Employ ‘Cyber Mercenaries’

Also known as the Atlantis Cyber-Army, the emerging organization has an enigmatic leader and a core set of admins that offer a range of services, including exclusive data leaks, DDoS and RDP. A for-hire cybercriminal group is feeling the talent-drought in tech just like the rest of the sector and has resorted to recruiting so-called […]

Leave a Comment

Mandiant: “No evidence” we were hacked by LockBit ransomware

Mandiant: “No evidence” we were hacked by LockBit ransomware American cybersecurity firm Mandiant is investigating LockBit ransomware gang’s claims that they hacked the company’s network and stole data. The ransomware group published a new page on its data leak website earlier today, saying that the 356,841 files they allegedly stole from Mandiant will be leaked […]

Leave a Comment

Pwn2Own Vancouver 2022 D1: MS Teams exploits received $450,000

White hat hackers earned a total of $800,000 on the first day of the Pwn2Own Vancouver 2022, $450,000 for exploits targeting Microsoft Teams. Pwn2Own Vancouver 2022 hacking contest has begun, it is the 15th edition of this important event organized by Trend Micro’s Zero Day Initiative (ZDI). This year, 17 contestants are attempting to exploit […]

Leave a Comment

He sold cracked passwords for a living – now he’s serving 4 years in prison

In this article, it turns out to be the first name (in Latin script, anyway) of a convicted cybercriminal called Glib Oleksandr Ivanov-Tolpintsev. Originally from Ukraine, Tolpintsev, who is now 28, was arrested in Poland late in 2020. He was extradited to the US the following year, first appearing in a Florida court on 07 September 2021, charged […]

Leave a Comment

Massive hacking campaign compromised thousands of WordPress websites

Researchers uncovered a massive hacking campaign that compromised thousands of WordPress websites to redirect visitors to scam sites. Cybersecurity researchers from Sucuri uncovered a massive campaign that compromised thousands of WordPress websites by injecting malicious JavaScript code that redirects visitors to scam content. The infections automatically redirect site visitors to third-party websites containing malicious content […]

Leave a Comment

Nation-state Hackers Target Journalists with Goldbackdoor Malware

A campaign by APT37 used a sophisticated malware to steal information about sources , which appears to be a successor to Bluelight. Sophisticated hackers believed to be tied to the North Korean government are actively targeting journalists with novel malware dubbed Goldbackdoor. Attacks have consisted of multistage infection campaign with the ultimate goal of stealing […]

Leave a Comment

Hackers Are Getting Caught Exploiting New Bugs

Leave a Comment

Anonymous Claims to Have Hacked the Central Bank of Russia

Anonymous-Claims-to-Have-Hacked-the-Central-Bank-of-Russia-1Download We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

Leave a Comment

Crypto.com: Fortune Favors the Hacker—$16M ‘Stolen’

DeFi: A Planet-Burning Ponzi Scheme What’s the craic, you ask? Andrew Asmakov answers—“Crypto.com Suffers Hack for At Least $15M”: “Definitely worse”The platform has yet to confirm that it has indeed been attacked [but] Crypto.com announced it was pausing withdrawals after “a small number of users experienced unauthorized activity in their accounts.” … A household name in […]

Leave a Comment

Pegasus: Google reveals how the sophisticated spyware hacked into iPhones without user’s knowledge

Pegasus spyware was allegedly used by governments to spy upon prominent journalists, politicians and activists. A Google blog has revealed how the sophisticated software was used to attack iPhone users. The software used a vulnerability in iMessages to hack into iPhones without the user’s knowledge. The Pegasus spyware, developed by Israel’s NSO group, made headlines for being used by […]

Leave a Comment

Hacking tools cheat sheet

Leave a Comment

How to Hide Shellcode Behind Closed Port?

The Shellcoder’s Handbook

Leave a Comment