Archive for the ‘Hacking’ Category

Pwn2Own Vancouver 2022 D1: MS Teams exploits received $450,000

White hat hackers earned a total of $800,000 on the first day of the Pwn2Own Vancouver 2022, $450,000 for exploits targeting Microsoft Teams. Pwn2Own Vancouver 2022 hacking contest has begun, it is the 15th edition of this important event organized by Trend Micro’s Zero Day Initiative (ZDI). This year, 17 contestants are attempting to exploit […]

Leave a Comment

He sold cracked passwords for a living – now he’s serving 4 years in prison

In this article, it turns out to be the first name (in Latin script, anyway) of a convicted cybercriminal called Glib Oleksandr Ivanov-Tolpintsev. Originally from Ukraine, Tolpintsev, who is now 28, was arrested in Poland late in 2020. He was extradited to the US the following year, first appearing in a Florida court on 07 September 2021, charged […]

Leave a Comment

Massive hacking campaign compromised thousands of WordPress websites

Researchers uncovered a massive hacking campaign that compromised thousands of WordPress websites to redirect visitors to scam sites. Cybersecurity researchers from Sucuri uncovered a massive campaign that compromised thousands of WordPress websites by injecting malicious JavaScript code that redirects visitors to scam content. The infections automatically redirect site visitors to third-party websites containing malicious content […]

Leave a Comment

Nation-state Hackers Target Journalists with Goldbackdoor Malware

A campaign by APT37 used a sophisticated malware to steal information about sources , which appears to be a successor to Bluelight. Sophisticated hackers believed to be tied to the North Korean government are actively targeting journalists with novel malware dubbed Goldbackdoor. Attacks have consisted of multistage infection campaign with the ultimate goal of stealing […]

Leave a Comment

Hackers Are Getting Caught Exploiting New Bugs

Leave a Comment

Anonymous Claims to Have Hacked the Central Bank of Russia

Anonymous-Claims-to-Have-Hacked-the-Central-Bank-of-Russia-1Download We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

Leave a Comment

Crypto.com: Fortune Favors the Hacker—$16M ‘Stolen’

DeFi: A Planet-Burning Ponzi Scheme What’s the craic, you ask? Andrew Asmakov answers—“Crypto.com Suffers Hack for At Least $15M”: “Definitely worse”The platform has yet to confirm that it has indeed been attacked [but] Crypto.com announced it was pausing withdrawals after “a small number of users experienced unauthorized activity in their accounts.” … A household name in […]

Leave a Comment

Pegasus: Google reveals how the sophisticated spyware hacked into iPhones without user’s knowledge

Pegasus spyware was allegedly used by governments to spy upon prominent journalists, politicians and activists. A Google blog has revealed how the sophisticated software was used to attack iPhone users. The software used a vulnerability in iMessages to hack into iPhones without the user’s knowledge. The Pegasus spyware, developed by Israel’s NSO group, made headlines for being used by […]

Leave a Comment

Hacking tools cheat sheet

Leave a Comment

How to Hide Shellcode Behind Closed Port?

The Shellcoder’s Handbook

Leave a Comment

Using Machine Learning to Guess PINs from Video

#MachineLearning: Hacking Tools for Computer + Hacking With Kali Linux + Python Programming- The ultimate beginners guide to improve your knowledge of programming and data science

Leave a Comment

Experts hacked a fully patched iOS 15 running on iPhone 13 at China’s Tianfu Cup hacking contest

White hat hackers earned $1.88 million at the Tianfu Cup hacking contest by finding vulnerabilities in popular software. The Tianfu Cup is the most important hacking contest held in China, this year white hat hackers earned $1.88 Million demonstrating vulnerabilities in popular software. The edition of this year took place on October 16 and 17 […]

Leave a Comment

Human hacking increased as apps and browsers moved completely to the cloud

“Today’s hyper-targeted spear phishing attacks, coming at users from all digital channels, are simply not discernable to the human eye. Add to that the increasing number of attacks coming from legitimate infrastructure, and the reason phishing is the number one thing leading to disruptive ransomware attacks is obvious.” Human interaction online has largely moved to […]

Leave a Comment

Pwned! The home security system that can be hacked with your email address

A researcher at vulnerability and red-team company Rapid7 recently uncovered a pair of risky security bugs in a digital home security product. The first bug, reported back in May 2021 and dubbed CVE-2021-39276, means that an attacker who knows the email address against which you registered your product can effectively use your email as a password to issue […]

Leave a Comment

3 Ways To Avoid Internet Hacking Incidents With Sports Related Ventures

Nowadays just as one cannot take enough safety measures when leaving their house of work to avoid running into problems and tribulations along the way, the exact same measures are to be taken into consideration when strolling around the wonderful world of the internet. It can be argued that the internet stands right up there […]

Leave a Comment

How to Reset Kali Linux Root Password?

Forgot the Kali Linux root password? Stress not! This tutorial discusses the steps to reset Kali Linux system password. Follow the steps, and you will get it done within minutes. Table of Contents Boot Into GRUB menu Edit GRUB menu Check RW Permissions on Root Partition Reset Kali Root Password Reboot System

Leave a Comment

The European Space Agency Launches Hackable Satellite

We can assume strong encryption, and good key management. Still, seems like a juicy target for other governments. Satellite Network Threats Hacking & Security Analysis : Satellite Network Hacking Security Analysis, Threats and Attacks, Architecture Operation design and technologies

Leave a Comment

NSO Group Hacked

There’s a lot to read out there. Amnesty International has a report. Citizen Lab conducted an independent analysis. The Guardian has extensive coverage. More coverage. Most interesting is a list of over 50,000 phone numbers that were being spied on by NSO Group’s software. Why does NSO Group have that list? The obvious answer is that NSO Group provides spyware-as-a-service, and centralizes […]

Leave a Comment

Hacker deposited $1M in a popular cybercrime marketplace to buy zero-day exploits

A threat actor that goes online with the name “integra” has deposited 26.99 Bitcoins on one of the cybercrime forums with the intent to purchase zero-day Exploits from other forum members, researchers from threat intelligence firm Cyble. According to the experts, the member “integra” has joined the cybercrime forum in September 2012 and has gained a high reputation over the course of time. The threat actor is also a member […]

Leave a Comment

A flaw in Peloton Bike+ could allow hackers to control it

A flaw in the Peloton Bike+ could be exploited by an attacker with initial physical access to gain root entry to the interactive tablet, taking complete control of the system. A vulnerability in the popular Peloton Bike+ could have allowed an attacker to gain complete control over the device, including the camera and microphone to […]

Leave a Comment