hacking news

Crooks impersonate LastPass in campaign to harvest master passwords

Password manager LastPass warns of an active phishing campaign impersonating the service to steal users’ master passwords. LastPass warned users…

4 weeks ago

VoidLink shows how one developer used AI to build a powerful Linux malware

VoidLink is a cloud-focused Linux malware, likely built by one person using AI, offering loaders, implants, rootkit evasion, and modular…

4 weeks ago

PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion

Threat actors use PDFSIDER malware with social engineering and DLL sideloading to bypass AV/EDR, and ransomware gangs already abuse it.…

4 weeks ago

Access broker caught: Jordanian pleads guilty to hacking 50 companies

A Jordanian man pleaded guilty in the US to selling illegal access to 50 compromised enterprise networks after an undercover…

4 weeks ago

Critical TP-Link VIGI camera flaw allowed remote takeover of surveillance systems

TP-Link fixed a critical flaw that exposed over 32 VIGI C and VIGI InSight camera models to remote hacking, with…

4 weeks ago

Telegram-based illicit billionaire marketplace Tudou Guarantee stopped transactions

Major Telegram-based illicit marketplace Tudou Guarantee appears to be shutting down its operations, according to Elliptic. Blockchain cybersecurity firm Elliptic…

4 weeks ago

UK NCSC warns of Russia-linked hacktivists DDoS attacks

The UK government warns Russia-linked hacktivists are still carrying out DDoS attacks on critical infrastructure and local government systems The…

4 weeks ago

StealC malware control panel flaw leaks details on active attacker<gwmw style="display:none;"></gwmw>

Researchers uncovered an XSS flaw in StealC malware’s control panel, exposing key details about a threat actor using the info…

4 weeks ago

Hacker pleads guilty to hacking Supreme Court, AmeriCorps, and VA Systems

An actor who goes online with the alias @ihackthegovernment posted stolen personal data from his victims, including the U.S. Supreme…

4 weeks ago

GootLoader uses malformed ZIP files to bypass security controls

GootLoader malware uses malformed ZIP files made of hundreds of concatenated archives to evade detection. GootLoader is used by ransomware…

4 weeks ago

This website uses cookies.