Blogs

Image

Hackers Repurpose RansomHub's EDRKillShifter in Medusa, BianLian, and Play Attacks

EDRKillShifter accomplishes its goals by means of a known tactic called Bring Your Own Vulnerable Driver (BYOVD) that involves using a legitimate but vulnerable driver to terminate security solutions protecting the endpoints.

Image

Satellite Navigation Systems Facing Rising Jamming and Spoofing Attacks

Satellite navigation systems are under rising threat from jamming and spoofing attacks, risking aviation, maritime, and telecom safety worldwide, warn global agencies.

Image

AI-TechHacks Launches Secure Platform to Hire a Hacker: Revolutionizing the Hacker-for-Hire Industry

AI-Tech Hacks, a leading provider of professional and ethical hacking services, is proud to announce the launch of its revolutionary platform, offering businesses and individuals the ability to securely hire certified hackers for various cybersecurity needs.

Image

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Windows-based systems running in CGI mode that could allow remote attackers to run arbitrary code.

Image

Get started in a cybersecurity career with this ethical hacking bundle deal

Are you feeling stagnant at your current job? You're not alone, and you may be due for a career change. Here's a fact that might finally inspire you to switch to cybersecurity: there are about 3.5 million unfilled cybersecurity jobs waiting to be filled, and some of those companies are willing to pay top dollar for experts who can protect their businesses from cyber threats.

Image

Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits

The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX Series routers from Juniper Networks as part of a campaign designed to deploy custom backdoors, highlighting their ability to focus on internal networking infrastructure.

Image

IT Companies Face Escalating Threats

Multiple cyber incidents, targeting telecom giants, healthcare providers, and government agencies. These attacks highlight the growing complexity of cyber threats and the need for stronger defenses.

Image

Why SMBs Are No Longer “Too Small” for Hackers

Small business owners might still believe the size of their company protects them from cyberattacks, assuming that hackers are only interested in larger, high-profile targets. However, cybercriminals will not discriminate based on company size

Image

Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains

Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow's content delivery network (CDN) to deliver the Lumma stealer malware.

Image

Hackers Exploit Fake GitHub Repositories to Spread GitVenom Malware

A recent campaign, dubbed GitVenom, targeting GitHub users with deceptive projects exemplifies this trend, as detailed in Kaspersky’s Securelist latest research authored by Georgy Kucherin and Joao Godinho.

Image

Cybercriminals Can Now Clone Any Brand's Site in Minutes Using Darcula PhaaS v3

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand's legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale.

Image

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret.

Image

Doxbin Data Breach: Hackers leak 136,000+ user records, emails, and a ‘blacklist’ file, exposing those who paid to keep their info off the doxxing platform.

Doxbin, a notorious platform associated with doxxing and the exposure of personal information, has been compromised by a hacker group known as Tooda. The attack, which appears a long-time rivalry between different groups, has resulted in the deletion of user accounts, a loss of administrative control, and a leak of a massive user database.

Image

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack

The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to paste and run malicious code provided by them.

Image

WhatsApp Hack Alert: Your phone might be hacked without clicking any link. Know about the 'Zero-Click' spyware

WhatsApp has issued a warning to its users, revealing that nearly 100 individuals across more than two dozen countries were targeted by a sophisticated hacking tool. The spyware, which was developed by Israeli company Paragon Solutions, specifically targeted journalists and members of civil society, making this an alarming breach of privacy.

Image

Lifetime access to InfoSec4TC courses gets you started in cybersecurity

When you're studying cybersecurity, the work is never really done. Technology changes, so the professionals who use it have to change, too. Whether you're a beginner or an established pro, you can keep up with new tech trends with an InfoSec4TC Platinum Membership.

Image

How Long Does It Take Hackers to Crack Modern Hashing Algorithms?

While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving. For example, NIST password recommendations are now prioritizing password length over complexity.

Image

In Gaming Item Scams and How to Avoid Them?

TF2 is a community infested with hackers and scammers who use extremely advanced methods to steal valuable items and accounts.

Image

Hackers Use XWorm RAT to Exploit Script Kiddies, Pwning 18,000 Devices

Wiz Research, a prominent player in the cloud security space, has observed that a critical security flaw, CVE-2024-50603, impacting the Aviatrix Controller cloud networking platform, has been actively exploited in the wild by threat actors.

Image

Hackers Claim Breach of Hewlett Packard Enterprise, Lists Data for Sale

The hacker, who was previously linked to several high-profile data breaches, is now selling the allegedly stolen data, demanding payment in Monero (XML) cryptocurrency to remain anonymous and untraceable.

Image

Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers

Wiz Research, a prominent player in the cloud security space, has observed that a critical security flaw, CVE-2024-50603, impacting the Aviatrix Controller cloud networking platform, has been actively exploited in the wild by threat actors.

Image

7 Steps of Ethical Hacking

Have you ever wondered how ethical hackers identify vulnerabilities that could cause organizations to fail to work? I have almost 5 years of experience as a cybersecurity expert, and I frequently come across this curiosity. Knowing how to get beyond security measures is only one aspect of ethical hacking.

Image

E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws

The European General Court on Wednesday fined the European Commission, the primary executive arm of the European Union responsible for proposing and enforcing laws for member states, for violating the bloc's own data privacy regulations.

Image

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks.

Image

Sophos Firewall Vulnerabilities Could Allow Remote Attacks

Sophos users must ensure that their firewall devices are updated with the latest updates, as the vendor addresses several security vulnerabilities. Exploiting these vulnerabilities could allow various malicious actions, including code execution attacks.

Image

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft

A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft.

Image

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft

A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft.

Image

North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign

North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie.

Image

New 5G Network Flaws Let Attackers Track Users' Locations and Steal Data

As 5G networks are being gradually rolled out in major cities across the world, an analysis of its network architecture has revealed a number of potential weaknesses that could be exploited to carry out a slew of cyber assaults, including denial-of-service (DoS) attacks to deprive subscribers of Internet access and intercept data traffic.

Image

A Comprehensive Guide to Becoming a Certified Ethical Hacker

Ethical hacking, also known as penetration testing, involves authorized attempts to breach computer systems, networks, or applications to identify and rectify security vulnerabilities.

Image

Hackers Target Job Seekers with AppLite Trojan Using Fake Job Emails

A new, stealthy banking trojan targeting Android devices, capable of stealing banking credentials, crypto wallets, and sensitive data.

Image

North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks

The North Korea-aligned threat actor known as Kimsuky has been linked to a series of phishing attacks that involve sending email messages that originate from Russian sender addresses to ultimately conduct credential theft.

Image

EVM hacking: US-based man booked by Mumbai Police over ‘false claims’

Mumbai's cyber police have registered an FIR against a US-based man who allegedly claimed he could tamper with and hack the Electronic Voting Machine (EVM), reported Indian Express on Sunday.

Image

Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign

A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages vulnerabilities and misconfigurations in Internet of Things (IoT) devices to co-opt them into a disruptive botnet.

Image

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution.

Image

Chinese Hackers Exploit Zero-Day in FortiClient VPN with ‘DeepData’ Toolkit

Chinese threat actor BrazenBamboo has been exploiting a previously undisclosed zero-day vulnerability in Fortinet’s FortiClient Windows VPN client using a modular post-exploitation toolkit named DeepData.

Image

Losses Worth $35 Million Hit The Firm

Months after the cybersecurity incident, the oil giant Halliburton shared details about the financial losses. According to the latest update, the cyberattack that targeted Halliburton earlier this year cost the firm $35 million.

Image

Get this $35 ethical hacking bundle deal for the IT job seeker on your list

If you’re looking for a unique and meaningful gift for the tech enthusiast in your life, here’s a bundle that delivers: The Ultimate Ethical Hacking Super-Sized Certification Prep Bundle for just $34.99. It’s packed with nine courses and 160 hours of content, designed to teach ethical hacking and cybersecurity skills from scratch.

Image

This $40 course bundle gives you on training in ethical hacking

Cybersecurity is an exciting field, but there's a lot to learn before you start applying for jobs. If you need an introduction to cybersecurity, check out this ethical hacking bundle.

Image

The TechCrunch Cyber Glossary

The cybersecurity world is full of technical lingo and jargon. At TechCrunch, we have been writing about cybersecurity for years, and even we sometimes need a refresher on what exactly a specific word.

Image

Halliburton confirms data was stolen in ongoing cyberattack

Energy giant Halliburton has confirmed its systems were hacked and that intruders “accessed and exfiltrated information” following a cyberattack last week.

Image

Pokémon resets some users’ passwords after hacking attempts

The Pokémon Company said it detected hacking attempts against some of its users and reset those user account passwords.

Image

What we know about CrowdStrike’s update fail that’s causing global outages and travel chaos

A faulty software update issued by security giant CrowdStrike has resulted in a massive overnight outage that’s affected Windows computers around the world.

Image

Activision investigating password-stealing malware targeting game players

Video game giant Activision is investigating a hacking campaign that’s targeting players with the goal of stealing their credentials, TechCrunch has learned.

Image

The biggest data breaches in 2024: 1 billion stolen records and rising

We’re almost at the end of 2024, a year that will go down as having seen some of the biggest, most damaging data breaches in recent history.

Copyright ©. All Rights Reserved by My Hacker Zone