hack news

  1. xanix

    Hacking WPCracker - WordPress User Enumeration And Login Brute Force Tool

    WPCracker WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control how aggressive an attack you want to perform, and this affects the attack time required. The tool makes it possible to adjust the number of threads as well as how...
  2. Serafim

    News Vulnerabilities in popular instant messengers allowed to spy on users

    Bugs in Signal, Google Duo, and Facebook Messenger allowed the called party's device to transmit audio before it answered the call. Vulnerabilities in a variety of mobile applications for video communication allowed attackers to listen to the surrounding sounds without the user's permission...
  3. Core

    News Microsoft told how the hackers who attacked SolarWinds evaded detection

    The hackers turned out to be skilled and methodical operators who follow best practices to ensure the security of operations. Information security specialists from Microsoft shared details about how hackers who attacked the SolarWinds supply chain managed to remain unnoticed and hide their...
  4. Gap

    News Vulnerabilities in Dnsmasq allow the "DNS cache poisoning" attack»

    In total, the researchers identified seven vulnerabilities in the Dnsmasq software, combined under the name DNSpooq. Specialists of the Israeli information security company JSOF have discovered a number of vulnerabilities in the popular Dnsmasq software that allow the "DNS cache poisoning"...
  5. Soldier

    Cryptocurrency Tether and Bitfinex seek further 30 days to produce critical trial documents

    iFinex Inc needs another 30 days to produce trial documents for the New York Attorney General. iFinex Inc — the parent company of crypto exchange Bitfinex and stablecoin issuer Tether (USDT) — has written to the New York Supreme Court requesting that its upcoming trial date be pushed back even...
  6. Otto

    News Hackers who hacked SolarWinds gained access to the internal email of Malwarebytes

    Hackers used applications with privileged access to Microsoft Office 365 and Azure environments. Security researchers from the information security firm Malwarebytes have confirmed that the cybercriminals responsible for the attack on the SolarWinds supply chain were able to access the...
  7. Tasken

    News Iranian cyber criminals are intimidated officials in the United States

    Operation Enemies of the People began after the US presidential election and resumed during the storming of the Capitol. The FBI reported on a malicious cyber operation called Enemies of the People ("Enemies of the People"), conducted by Iranian hackers against the US federal government, state...
  8. Serafim

    News The failure led to the removal of 150 thousand data of suspects from the database of the British police

    Criminals could go unpunished because evidence collected from crime scenes was not recorded in the electronic system. The UK government is assessing the possible consequences of a "technical error" that caused 150,000 records to be deleted from police databases, including suspects '...
  9. Lucky

    News The failure led to the removal of 150 thousand data of suspects from the database of the British police

    Criminals could go unpunished because evidence collected from crime scenes was not recorded in the electronic system. The UK government is assessing the possible consequences of a "technical error", due to which 150 thousand records were deleted from police databases, including fingerprints of...
  10. xanix

    News Hackers break into corporate accounts in cloud services

    The US authorities reported hacking of cloud corporate accounts due to employees ' failure to comply with the requirements of cyber hygiene. The US Cybersecurity and Infrastructure Security Agency (CISA) has reported a series of successful cyber attacks on a number of cloud services. According...
  11. Tasken

    Cryptocurrency MicroStrategy stock finally takes a breather following massive BTC-inspired rally

    MSTR declined by as much as 12.6% on Monday as Bitcoin pulled back sharply from $40,000 levels. Shares of MicroStrategy (MSTR), a business intelligence firm with considerable exposure to Bitcoin (BTC), declined sharply on Monday as profit-taking ensued following a parabolic rally over the past...
  12. Otto

    News LC: Hackers of US government agencies used software used by Russian hackers

    A Kaspersky Lab study claims that the malware used by attackers during a cyberattack on US government agencies in December is similar to tools that are linked to Russian hackers. Hackers broke into the IT systems of US government agencies using tools used by the Russian cybercrime group Turla...
  13. al capone

    News Durov calls for switching to Android to preserve information freedom

    According to Durov, Apple is more dangerous than Google, because it can completely restrict users ' access to the applications they use. Telegram founder Pavel Durov said in his blog that Apple may restrict the freedom of users. Therefore, it is better for users to switch from the iOS platform...
  14. Tasken

    News The central bank of New Zealand was subjected to a hacker attack

    Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an unknown group of hackers, the press service of the regulator reported on January 10. image Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an...
  15. xanix

    News On the shadow forum, a database of users is put up for sale hyundai.ru

    The database contains 1.3 million records of registered users. According to the telegram channel of information leakage, an announcement about the sale of a database containing the data of 1.3 million registered users of the site appeared on the shadow forum hyundai.ru. According to the...
  16. Soldier

    News Serious vulnerability found in Samsung Galaxy Note 20

    Due to the" abnormal behavior " of the fingerprint scanner in the Galaxy Note20 series smartphones, the smartphone could be unlocked by any unauthorized person simply by scanning their finger. image Manufacturers of modern gadgets are constantly improving the protection of their devices, trying...
  17. al capone

    News US intelligence agencies named the target of the attack by Russian hackers

    United States intelligence agencies believe that the massive hacking attack on federal agencies in December was an attempt to obtain intelligence and "probably originated from Russia." The Federal Bureau of Investigation( FBI), the US Cybersecurity and Infrastructure Protection Agency (CISA) and...
  18. Soldier

    News Published an exploit to bypass Cloudflare WAF

    The problem has been known since at least June 2019, but it still remains uncorrected. Cloudflare's Web Application Firewall (WAF), used by more than 25 million sites, contains a vulnerability that allows you to bypass the rules and carry out an XSS attack. It is noteworthy that the problem has...
  19. Gap

    Cryptocurrency Crypto users donate $400K to Julian Assange defense as Mexico proposes asylum

    A U.K. judge ruled against extraditing the WikiLeaks founder to the U.S. in response to his legal team arguing he would have a "high risk of serious depression leading to suicide." Amid speculation on social media that United States President Donald Trump may still pardon Julian Assange before...
  20. Soldier

    News The Microsoft Edge browser will warn users about the "leaked" passwords

    The function of checking whether user usernames and passwords were stolen will appear in the Microsoft Edge browser after its update, which is scheduled for release in January. The browser will constantly check the information with databases of information about declassified usernames and...
Top Bottom