hacking 2021

  1. Dorblue

    News In the course of a large-scale phishing campaign, three new malicious programs were used

    The UNC2529 group attacked about 50 organizations around the world with phishing emails. e Criminals have organized a large-scale phishing campaign against organizations from a wide variety of industries in countries around the world using new types of malware. According to experts from the...
  2. Dorblue

    Anonymity 10 methods of protection against wiretapping and hacking

    1) Use strong passwords A password is a basic way to protect your data. Its choice should be approached carefully. Primitive sets of numbers, words, including modified ones, any of your personal data contained in your password, and persons interested in hacking are selected quickly enough using...
  3. Dorblue

    News Hackers stole $50 million in cryptocurrency from the Uranium Finance project

    The attackers exploited a vulnerability in the logic of the Uranium balance modifier, increasing the project's balance by 100 times. The project of decentralized finance Uranium Finance based on the Binance Smart Chain blockchain was the victim of a cyber attack, as a result of which the...
  4. al capone

    News Facebook defuses spying operation by Palestinian hackers

    Cybercriminals used fake and hacked accounts to deceive users of the social network. Facebook specialists have defused the operations of two hacker groups sponsored by the Palestinian authorities. The criminals used the social network to distribute malware for the purpose of espionage...
  5. K

    News The police detained a hacker who stole 15 million rubles

    The accused together with his accomplices, was circulated on the Internet, malicious software One of the members of a group of Russian hackers who stole 15 million rubles from the accounts of commercial organizations, was detained while trying to escape to Kyrgyzstan, said the official...
  6. al capone

    Hacking Tools Setting up iPhone to carding work

    1. Who does not know how to use socks on an iPhone - there are 2 methods. The first is to go to Wi-Fi, poke the letter "i". Scroll to the bottom, see the proxy settings, enter, profit. The second is the ShadowRocket attachment. I think you can figure it out on your own. 2. How to replace GEO...
  7. Otto

    News Hackers sold 895 thousand gift certificates on a cybercrime forum

    Gift certificates belong to Airbnb, Amazon, American Airlines, Chipotle, Marriott, Nike, Subway, Target, Walmart, etc. At one of the largest cybercrime forums, 895 thousand gift certificates worth a total of $38 million were put up for sale. The database contains certificates from several...
  8. Lucky

    Tips Leaked Method | GET Free SMS-Phone Verification

    Leaked Method | GET Free SMS-Phone Verification *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Now you should have a number. To see SMS messages, go to the # (Phone Numbers) option -> Active numbers Click on the number and proceed to...
  9. Jaysu

    News Russian hackers preyed on US rapid-response cyber services

    An hackers, according to CNN, after a large-scale cyber breach in the United States, tried to attack specialists who were supposed to be among the first to respond to the attack. For months, while U.S. officials were unaware of a cyberattack on U.S. government agencies through the SolarWinds...
  10. Core

    News Moscow police detain a dangerous hacker

    The damage in the criminal case is estimated at tens of millions of rubles. Law enforcement officers detained a hacker who, as part of a group of people, installed malicious software on the computers of commercial organizations in Moscow and obtained tens of millions of rubles from firms...
  11. Jeremys

    News The Purple Fox malware actively attacks vulnerable Windows systems

    The malware received a worm-like module that allows you to scan and infect Windows-based systems available on the Network during attacks. The Purple Fox malware, which was previously distributed using exploit kits and phishing emails, has now released a worm-like module. The new feature allows...
  12. Tasken

    News Spain suspects Russian security services of involvement in cyberattack on employment service

    On March 9, the computer systems of the National Employment Service were attacked by a ransomware virus-it encrypts files in the system, depriving users of access. The Spanish intelligence service suspects Russian special services in the attack on the Spanish State Employment Service (SEPE)...
  13. Tasken

    News Hackers gained access to surveillance cameras in Tesla, Cloudflare, banks and not only

    Bloomberg reports that a group of hackers managed to gain access to surveillance cameras installed in Tesla, Equinox, medical clinics, prisons and banks. In addition to the images from the cameras, the hackers published screenshots proving that they had direct access to the surveillance systems...
  14. Jeremys

    News REvil ransomware hacked Acer and demanded $50 million

    The attack only affected the operation of the Acer office network, without disrupting production processes. One of the largest manufacturers of computer equipment, the Taiwanese company Acer, has become another victim of the extortionate operation REvil. According to the publication The Record...
  15. K

    Hacking Tools Heartbleed SSL bug Scanning using Nmap on Kali Linux

    In this tutorial we will be scanning a target for the well known Heartbleed SSL Bug using the popular Nmap tool on Kali Linux. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library and was introduced on 31 December on 2011 and released in March 2012...
  16. xanix

    News Major Russian-language hacker forum Maza was the victim of a data leak

    The attackers stole IDs, usernames, email addresses, and links to messengers. The Maza cybercrime forum was the victim of a data leak that compromised the information of its users. The leak was discovered by Flashpoint specialists. Maza, also known as Mazafaka, is a closed Russian-language...
  17. sanok

    News iPhone 12 finally hacked

    The updated Unc0ver 6.0.0 jailbreak utility for iPhone supports hacking from iOS 11 to iOS 14.3, iOS 14.4 does not. The team of hackers of the Apple mobile platform with the experience of Unc0ver has released a jailbreak that works on iOS from version 14 to 14.3 with support for all iPhone...
  18. Gap

    Anonymity Cybersecurity | If the have already come to you..

    Let's say they came to you, and they came to you. In any case, your task is to build a correct picture of what is happening in front of the investigators, which makes you innocent, and them - making mistakes and trying to sew a case to an innocent person - that is, you. To understand what and...
  19. Dorblue

    News Iranian hackers attack local residents, posing a threat to the current regime

    Over the past four years, Domestic Kitten has carried out extensive surveillance of users and conducted at least 10 malicious campaigns. The specialists of the information security company Check Point told about the cyber operations conducted by the APT group Domestic Kitten. The group, also...
  20. xanix

    Hacking Tools Web-Brutator - Modular Web Interfaces Bruteforcer

    Web Brutator Fast Modular Web Interfaces Bruteforcer ? Install python3 -m pip install -r requirements.txt ⏩ Usage $ python3 web-brutator.py -h __ __ . _______ __ __ / \ / \ __\_ | \______ \_______ __ / |___ / |...
Top Bottom