menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

TechCrunch

2h

read

98

img
dot

Image Credit: TechCrunch

Hidden Waymo feature let researcher customize robotaxi’s display

  • A security researcher discovered a hidden feature in the Waymo app that allowed her to customize the robotaxi's display.
  • Jane Manchun Wong was able to show custom characters on the Waymo car's top display using the unreleased feature.
  • Waymo has since updated the app to prevent users from customizing the display.
  • The dome display on Waymo cars is used for identification, communication with pedestrians, and marketing purposes.

Read Full Article

like

5 Likes

source image

Cryptoslate

6h

read

86

img
dot

Image Credit: Cryptoslate

Phemex reassures users with a compensation plan after $37 million hot wallet breach

  • Singapore-based crypto exchange Phemex has temporarily suspended withdrawals following a reported $37 million exploit targeting one of its hot wallets.
  • Cyvers, a blockchain security firm, detected the breach, with $29 million transferred from Phemex's hot wallets to various blockchains.
  • The attackers swiftly swapped the stolen tokens into Ethereum to evade detection and freezing.
  • Phemex is developing a compensation plan for affected users and assures that its cold wallets, which hold the majority of funds, are secure.

Read Full Article

like

5 Likes

source image

Siliconangle

8h

read

190

img
dot

Image Credit: Siliconangle

SentinelOne report highlights shared tactics between HellCat and Morpheus ransomware groups

  • SentinelOne Inc. report highlights evolving tactics of HellCat and Morpheus ransomware groups.
  • HellCat and Morpheus leverage identical payloads in their ransomware campaigns, suggesting a possible shared codebase or builder application.
  • Both groups target high-value sectors including pharmaceuticals, manufacturing, and government entities.
  • The findings emphasize the importance of organizations adopting robust cybersecurity measures.

Read Full Article

like

11 Likes

source image

Hackersking

13h

read

101

img
dot

Image Credit: Hackersking

Unveiling the Truth: Profile View Tracking on Telegram

  • Telegram is a popular messaging platform known for its privacy, security, speed, and versatility.
  • Unlike Instagram or WhatsApp, Telegram does not provide a feature to see who viewed your profile.
  • Third-party apps claiming to offer profile view tracking on Telegram are often scams and pose risks such as data theft, malware, and account suspension.
  • To enhance privacy on Telegram, users should customize their privacy settings, enable two-step verification, avoid sharing sensitive information, and use secret chats with end-to-end encryption.

Read Full Article

like

6 Likes

source image

Hackersking

13h

read

210

img
dot

Image Credit: Hackersking

Instagram Profile Picture Insights: Possibility to access Old Instagram Profile

  • Instagram does not publicly provide access to past profile pictures.
  • Users can access old profile pictures by saving them to their devices or archives.
  • Avoid using third-party tools as they may compromise account security.
  • Instagram prioritizes user privacy and promotes a secure and user-friendly experience.

Read Full Article

like

12 Likes

source image

Securityaffairs

14h

read

236

img
dot

Image Credit: Securityaffairs

Cisco addresses a critical privilege escalation bug in Meeting Management

  • Cisco released security updates to address a critical privilege escalation bug in its Meeting Management.
  • The vulnerability allows remote, authenticated attackers to gain administrator privileges on affected instances.
  • The flaw resides in the REST API of Cisco Meeting Management and arises from a lack of proper authorization.
  • There are no known attacks exploiting this vulnerability in the wild.

Read Full Article

like

14 Likes

source image

NullTX

14h

read

346

img
dot

Image Credit: NullTX

Crypto Users Beware: New Malware Targets Wallets Through Fake Homebrew Installers in Google Ads Scam

  • A new wave of malware targeting cryptocurrency users has emerged through deceptive Google Ads campaigns.
  • Attackers create fraudulent ads, posing as Homebrew installers, to redirect users to fake websites.
  • The malware steals sensitive data, including crypto wallet credentials, through various tactics.
  • To protect themselves, users should avoid clicking on ads, be cautious with unknown commands, use antivirus software, and opt for hardware wallets.

Read Full Article

like

20 Likes

source image

Securityaffairs

16h

read

359

img
dot

Image Credit: Securityaffairs

U.S. President Donald Trump granted a “full and unconditional pardon” to Ross Ulbricht, Silk Road creator

  • U.S. President Donald Trump granted a “full and unconditional pardon” to Ross Ulbricht, the creator of the Silk Road, a dark web drug marketplace.
  • Ulbricht was convicted in 2015 for narcotics and money-laundering conspiracy and was serving a life sentence.
  • Trump's decision to pardon Ulbricht was based on claims of government overreach in the case.
  • Silk Road facilitated billions of dollars worth of transactions and generated millions in earnings for Ulbricht.

Read Full Article

like

21 Likes

source image

Medium

18h

read

47

img
dot

Image Credit: Medium

How Hackers Identify Weak Spots in Banking Systems

  • Hackers use various methods to identify weak spots in banking systems, including gathering information through passive reconnaissance and analyzing publicly available data.
  • Social engineering techniques like phishing emails, phone phishing, and smishing are commonly used to trick officials or customers into sharing confidential information.
  • Hackers exploit vulnerabilities in outdated software, poorly configured servers, and known exploits to gain unauthorized access to banking systems.
  • Methods such as man-in-the-middle attacks, brute force attacks, credential augmentation, and inserting malware are employed to compromise banking systems.

Read Full Article

like

2 Likes

source image

Hackers-Arise

1d

read

227

img
dot

Image Credit: Hackers-Arise

Can Artificial Intelligence Be Used to Track Your Location?

  • Exif data containing GPS information in photos have been used to track the location and habits of users on social media in the past. However, AI technology is revolutionizing geolocation by tracking users through photos online. GeoSpy is an advanced Visual Place Recognition (VPR) system that uses artificial intelligence to find a photo's location by analyzing the pixels in the image. GeoSpy uses advanced embedding models to turn raw pixel data into numerical representations and analyzes various visual clues to create a comprehensive picture of how these elements interact. GeoSpy is an invaluable tool for open-source intelligence (OSINT) investigators, law enforcement, and security professionals.
  • GeoSpy uses AI to analyze everything from architectural styles and infrastructure elements to cultural indicators, making it more accurate than earlier landmark recognition systems. GeoSpy is used to verify news photos, trace viral content, check the authenticity of visual evidence, locate missing persons, and identify locations in surveillance footage, among other things.
  • One of the most impressive features is that GeoSpy understands the relationship between different elements in an image and makes sense of ambiguities. The science of visual analysis works through several layers, making it highly accurate.
  • GeoSpy's main technology, Superbolt, is built on years of research in computer vision, which creates compact mathematical representations of features in photos. These representations capture details like textures, building styles, and environmental factors.
  • Infrastructure elements, such as streetlights, road markings, and utility installations, are another key focus of GeoSpy. These elements often follow regional standards and are highly location-specific.
  • GeoSpy can account for variations in lighting, seasons, and even years by comparing current photos with historical reference images. This includes factoring in changes like new buildings or urban growth, allowing it to estimate when a photo was taken. Weather patterns also contribute to GeoSpy's analysis.
  • GeoSpy's vector search capabilities enable it to perform complex analyses quickly by generating compact embeddings that capture various visual elements and comparing them to its large database of reference images.
  • GeoSpy's ability saves time and resources of the investigators. Using GeoSpy, they can trace viral content, authenticate photos and enhance safety. Insurance companies also verify claim photos, while online marketplaces check the authenticity of product images. Dating apps use it to stop users from faking their location and to enhance the user's safety.
  • GeoSpy Superbolt's demo page can be accessed for free. Users can upload an image, and Superbolt will display possible location(s) where the photo was taken, often pinpointed on a map.
  • The science of visual analysis has made GeoSpy an essential tool for investigators, journalists, and professionals in OSINT. Speed is critical, as targets move often. Legal enforcement and the financial industry can use GeoSpy to prevent fraud.

Read Full Article

like

13 Likes

source image

Hackersking

1d

read

177

img
dot

Image Credit: Hackersking

How To Recover Instagram Hacked Account Complete Guide

  • Instagram has become a target for hackers, but recovering a hacked account is possible.
  • Step 1: Check for Login Issues - Try logging in, check email notifications, and use the login help option.
  • Step 2: Recover Your Account - Fill the recovery form on Instagram's official website.
  • Step 3: Secure Your Account Using the Instagram Support Team - Report the hacked account and follow instructions.
  • Step 4: Regain Access via Linked Accounts or Devices - Try logging in through Facebook or use saved login info.
  • Step 5: Recover Access Through Email and Phone - Check original email, use recovery options, and contact email provider if needed.
  • Step 6: Strengthen Your Account Security - Enable two-factor authentication, review account activity, update email and password, and remove suspicious third-party apps.
  • In conclusion, following this guide will help you recover your hacked Instagram account and enhance its security.

Read Full Article

like

10 Likes

source image

Coinpedia

14h

read

7

img
dot

Image Credit: Coinpedia

Crypto Scam Alert: Why You Should Avoid $TRUMP and $MELANIA Tokens

  • Scammers are targeting investors of meme coins linked to Donald Trump and Melania.
  • Fake websites ask users to connect their wallets and then steal funds or cryptocurrency.
  • Scams exploit trust by displaying official-looking token addresses.
  • Investors are advised to research platforms, avoid sharing wallet data, and use secure wallets.

Read Full Article

like

Like

source image

Securityaffairs

1d

read

41

img
dot

Image Credit: Securityaffairs

Pwn2Own Automotive 2025 Day 1: organizers awarded $382,750 for 16 zero-days

  • Trend Micro’s Zero Day Initiative (ZDI) announced that $382,750 was awarded on Day 1 of Pwn2Own Automotive 2025.
  • The organizers awarded $382,750 for 16 unique working zero-day exploits targeting infotainment systems, electric vehicle (EV) chargers, and automotive operating systems.
  • The team fuzzware.io earned $50,000 and 10 Master of Pwn points, while Sina Kheirkhah received the biggest reward of $50,000 and 5 Master of Pwn points.
  • No attempts were made to demonstrate vulnerabilities in a Tesla vehicle.

Read Full Article

like

2 Likes

source image

TechCrunch

1d

read

243

img
dot

Image Credit: TechCrunch

What PowerSchool isn’t saying about its ‘massive’ student data breach

  • PowerSchool SIS, which provides K-12 software to more than 18,000 schools to support some 60 million students in the United States, confirmed the breach in early January.
  • Hackers used compromised credentials to breach its customer support portal, allowing further access to the company’s school information system.
  • PowerSchool has declined to answer open questions about the incident, which could potentially be one of the biggest breaches of the year.
  • PowerSchool customers affected by the breach have many unanswered questions, with many impacted schools collaborating to investigate the hack.
  • The scale of the hack is unclear; PowerSchool has not revealed the number of schools or students affected.
  • Sensitive personal information on students and teachers, including some students’ Social Security numbers, grades, demographics, and medical information, was stolen.
  • PowerSchool worked with a cyber-extortion incident response company to negotiate with the threat actors responsible for the breach, indicating that it might have paid the ransom to them.
  • The company has refused to say how much it paid or how much the hackers demanded.
  • Uncertainty remains over whether the hackers are still in possession of the stolen data, despite early reports suggesting that PowerSchool received video proof of deletion.
  • The identity of the attackers remains unknown, with PowerSchool remaining tight-lipped.

Read Full Article

like

14 Likes

source image

Securityaffairs

1d

read

306

img
dot

Image Credit: Securityaffairs

Cloudflare blocked a record-breaking 5.6 Tbps DDoS attack

  • Cloudflare announced blocking a record-breaking 5.6 Tbps DDoS attack.
  • The attack occurred on October 29 and lasted for 80 seconds.
  • The botnet behind the attack consisted of 13,000 IoT devices.
  • Cloudflare's detection and mitigation were fully automated.

Read Full Article

like

18 Likes

For uninterrupted reading, download the app