hacking news

  1. Jeremys

    News The blogger hacked the scammers who tried to deceive him and showed them an image from their own webcam | LOL

    Attackers posing as an Amazon call center "ran into" a seasoned fraud hunter. Internet scammers should be prepared for the fact that the "fish" that they are trying to catch on their hook may not be up to them. This is exactly what happened to the careless scammers who tried to deceive the...
  2. Dorblue

    News In the course of a large-scale phishing campaign, three new malicious programs were used

    The UNC2529 group attacked about 50 organizations around the world with phishing emails. e Criminals have organized a large-scale phishing campaign against organizations from a wide variety of industries in countries around the world using new types of malware. According to experts from the...
  3. al capone

    News Fraudsters copy the voices of company executives to deceive victims

    In just the past four months, the number of incidents involving voice copying has increased by 60%. The number of scammers with voice-copying tools is growing rapidly. Criminals have a variety of materials to teach artificial intelligence algorithms, including audio clips, podcasts, and online...
  4. xanix

    News Courts in Brazil hit by REvil ransomware attack

    The ransomware demanded $5 million from TJRS for data recovery. The extortionist group REvil attacked the network of the judicial system of the Brazilian state of Rio Grande do Sul, encrypting files on computers, which led to the suspension of the courts. The attack occurred on April 28 this...
  5. Dorblue

    News Hackers stole $50 million in cryptocurrency from the Uranium Finance project

    The attackers exploited a vulnerability in the logic of the Uranium balance modifier, increasing the project's balance by 100 times. The project of decentralized finance Uranium Finance based on the Binance Smart Chain blockchain was the victim of a cyber attack, as a result of which the...
  6. Jeremys

    News Hackers attack corporate Networks via File Zend File sharing Servers

    This campaign is very similar to the attacks through vulnerabilities in the Accellion FTA file sharing solution in December 2020. Cybercriminals are hacking into corporate and government computer systems to steal sensitive data through two vulnerabilities in a popular file-sharing server. As...
  7. Lucky

    Tips Bypassing 2 Factor Authentication With Cookies

    If you have two-factor authentication (2FA) enabled on your account, you can’t be compromised, right? Well, not exactly. As technology advances, so do the attackers. Phishing attacks have become more sophisticated and attackers are finding ways to bypass 2FA. The reason why is because of the...
  8. al capone

    News Facebook defuses spying operation by Palestinian hackers

    Cybercriminals used fake and hacked accounts to deceive users of the social network. Facebook specialists have defused the operations of two hacker groups sponsored by the Palestinian authorities. The criminals used the social network to distribute malware for the purpose of espionage...
  9. Jaysu

    News Hackers broke the Passwordstate update mechanism to send malware

    Malicious updates were distributed in the period from 20 to 22 April this year. Unknown attackers compromised the Passwordstate corporate password manager update mechanism and used it to install malware on users ' systems. The developer of Passwordstate, Click Studios, has already sent out...
  10. Dorblue

    News Criminals use Telegram to control ToxicEye malware

    The malware is capable of stealing data, transferring and deleting files, terminating processes, launching a keylogger, etc. Attackers have become more likely to use the Telegram messenger as a C & C server in order to distribute malware to steal confidential information. Experts from the...
  11. Jeremys

    Hacking How to use SQLMAP to test a website for SQL Injection vulnerability

    What is SQL Injection? SQL Injection is a code injection technique where an attacker executes malicious SQL queries that control a web application’s database. With the right set of queries, a user can gain access to information stored in databases. SQLMAP tests whether a ‘GET’ parameter is...
  12. al capone

    News Cybercriminals attacked US and European organizations after 0-day in Pulse Connect Secure

    In total, experts identified 12 malware families associated with attacks on Pulse Secure VPN. Cybercriminals are attacking corporate networks through a zero-day vulnerability in Pulse Connect Secure gateways ( CVE-2021-22893), for which a fix has not yet been released. According to experts of...
  13. Dorblue

    News Sberbank commented on the" leak " of customer data

    Sberbank said that there was no leakage of customer data of "Sberpremier". The data, the announcement of the sale of which appeared recently on the Internet, does not contain bank secrecy. This is how Sberbank commented on the message about the sale of customer data to SberPremier. On April...
  14. Dorblue

    News Vulnerability in WhatsApp for Android allows you to steal data from memory cards

    Devices running Android version 10 and earlier are vulnerable to attacks. Specialists of the information security company CENSUS presented details about the vulnerability they discovered in WhatsApp for Android, which allows you to carry out a Man-in-the-Disk (MitD) attack. The vulnerability...
  15. Core

    Cryptocurrency Dogecoin doubles in a day as YTD gains hit 5,000% while Bitcoin price dips

    Everyone's favorite meme cryptocurrency has delivered 12,600% gains in a year and likely created a string of millionaires. Dogecoin (DOGE), the meme-based altcoin which has become a favorite talking point of Elon Musk, has doubled in 24 hours to hit all-time highs of $0.29. DOGE/USD 1-hour...
  16. K

    News The police detained a hacker who stole 15 million rubles

    The accused together with his accomplices, was circulated on the Internet, malicious software One of the members of a group of Russian hackers who stole 15 million rubles from the accounts of commercial organizations, was detained while trying to escape to Kyrgyzstan, said the official...
  17. Soldier

    News Hackers install Monero Miners through ProxyLogon vulnerabilities in Microsoft Exchange

    The hackers ' wallet began receiving cryptocurrency on March 9, just a few days after it became aware of vulnerabilities in Microsoft Exchange. Cybercriminals are attacking vulnerable Microsoft Exchange servers in order to install cryptocurrency mining software as part of a malicious campaign...
  18. xanix

    Bank Carding Skimmer Part LIST

    It is not the complete list of items you need to fully build the skimmer but it is the list of the components needed to build the custom board the skimmer operates off of. Youre welcome. Aluminium Cap - PCE3885CT-ND Aluminium Cap - PCE3885CT-ND CAP-NP - 445-2515-1-ND CAP-NP - 399-1170-1-ND...
  19. xanix

    News Hackers posted the data of 1.3 million users of the social network Club house

    The data leaked to the Network is not confidential, but it may be enough for subsequent hacker attacks. The data of Clubhouse users was published on the hacker forum for free access. The data contains information such as the account name, user name, linked Twitter and Instagram accounts, the...
  20. Jaysu

    News Hackers are preparing powerful cyber attacks on Russians during the May holidays

    This month, access to the switchboard of one of the telecom operators was sold on the darknet. Cybercriminals are preparing to carry out mass attacks on the bank accounts of Russian users next month. According to DeviceLock, attackers can exploit a vulnerability in mobile communications that...
Top Bottom