menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Kitploit

2w

read

200

img
dot

Image Credit: Kitploit

Uro - Declutters Url Lists For Crawling/Pentesting

  • Uro is a tool designed to declutter URL lists used for crawling or security testing by removing uninteresting or duplicate content.
  • It filters out incremental URLs, blog posts, URLs with parameter value differences, and 'useless' files such as images, JS, and CSS.
  • It can be easily installed using pipx and offers basic usage by feeding data through stdin or advanced features like reading from a file, whitelisting or blacklisting extensions, and applying filters for granular control.
  • Users can customize the filtering process by specifying whitelist, blacklist, and filters like hasparams, noparams, hasext, noext, allexts, keepcontent, keepslash, and vuln.

Read Full Article

like

12 Likes

source image

Securityaffairs

2w

read

74

img
dot

Image Credit: Securityaffairs

Pro-Russia hacktivist group NoName057(16) is targeting Dutch organizations

  • Pro-Russia hacktivist group NoName057(16) is targeting Dutch organizations with large-scale DDoS attacks, as warned by the National Cyber Security Center (NCSC).
  • Recent DDoS attacks by the group are believed to be in retaliation for the Netherlands' military aid to Ukraine, causing disruptions to municipal and provincial websites in the country.
  • NoName057(16) has a history of targeting government and critical infrastructure organizations worldwide, using tools like the Bobik botnet for DDoS attacks.
  • The hacktivist group operates in waves, intensifying attacks during periods of geopolitical tensions, such as supporting Ukraine in military or diplomatic ways.

Read Full Article

like

4 Likes

source image

Securityaffairs

2w

read

244

img
dot

Image Credit: Securityaffairs

FBI shared a list of phishing domains associated with the LabHost PhaaS platform

  • The FBI shared a list of 42,000 phishing domains associated with the LabHost PhaaS platform, shut down in April 2024, to raise awareness and aid in identifying compromises.
  • LabHost was one of the largest phishing-as-a-service platforms, offering various illicit services for about 10,000 users, allowing cybercriminals to impersonate over 200 organizations to gather personal and banking information.
  • An international law enforcement operation coordinated by Europol, called Nebulae, led to the shutdown of LabHost in April 2024, resulting in the arrest of 37 individuals involved in the platform.
  • LabHost provided phishing kits, hosting infrastructure, and campaign management tools, with around 40,000 phishing domains linked to the platform, reaching users globally who paid a monthly fee for its services.

Read Full Article

like

14 Likes

source image

Securityaffairs

2w

read

362

img
dot

Image Credit: Securityaffairs

Canadian electric utility Nova Scotia Power and parent company Emera suffered a cyberattack

  • Canadian electric utility Nova Scotia Power and parent company Emera are facing a cyberattack that disrupted their IT systems and networks.
  • The cyberattack on Nova Scotia Power Inc., a subsidiary of Emera Inc., did not cause any power outages affecting over 500,000 customers in Nova Scotia.
  • Both companies activated incident response and business continuity protocols, engaged cybersecurity experts, and isolated affected servers to contain the cyber threat.
  • Emera confirmed no disruption to its Canadian or international operations despite the cyber incident, and the financial impact is not expected with Q1 results set for May 8, 2025 release.

Read Full Article

like

21 Likes

source image

Metro

2w

read

384

img
dot

Image Credit: Metro

The surprising tactics of hackers targeting major firms like M&S and Co-op

  • Major firms like M&S and Co-op are facing constant cyber attacks with hackers employing clever tactics to breach their systems.
  • The recent ransomware attack on M&S led to disruptions in payments and online ordering, potentially causing significant financial losses.
  • Hackers like Scattered Spider are targeting companies through non-sophisticated methods, relying on tricks and persistence rather than advanced techniques.
  • The attack on M&S involved encrypting servers with ransomware, leading to potential corruption of backups and prolonged impacts.
  • Hackers often exploit vulnerabilities by using social engineering tactics like impersonating staff to gain access to systems.
  • Motivations of hackers vary, with some seeking recognition from peers while others aim to cause chaos and economic harm on behalf of state actors.
  • The frequency of cyber attacks remains high, with continuous attempts to exploit weaknesses in systems, although the actual trend is hard to determine.
  • Increased transparency about breaches, like in the case of M&S, contributes to the perception of a rise in cyber attacks, even if the numbers may not be escalating.
  • Companies are advised to enhance their cybersecurity measures and remain vigilant against evolving tactics employed by hackers.
  • To report more stories or news, contact the news team at [email protected].

Read Full Article

like

23 Likes

source image

Medium

2w

read

423

img
dot

Image Credit: Medium

Black Hats, White Hats, and Gray: Decoding the Hacker World and How It Affects You

  • Hackers come in various forms, from malicious black hats to ethical white hats, with gray hats in between, impacting individuals and businesses.
  • Black hat hackers exploit vulnerabilities for personal gain, exemplified by incidents like the 2020 Twitter hack and the 2017 WannaCry ransomware attack.
  • Practical tip: Use password managers and enable two-factor authentication to enhance your digital security against malicious actors.
  • White hat hackers, like Marcus who helped a bank avert disaster, contribute to cybersecurity by identifying vulnerabilities and are often rewarded through bug bounties.

Read Full Article

like

25 Likes

source image

Coinpedia

3w

read

152

img
dot

Image Credit: Coinpedia

Crypto Crash: Nearly 2M Tokens Fail in Just 3 Months

  • Over 50% of all cryptocurrencies listed on CoinGecko have become inactive, with 3.7 million projects considered dead out of nearly 7 million listed since 2021.
  • In the first three months of 2025, around 1.8 million crypto coins have failed, making it the worst year for project shutdowns with half of all failures since 2021.
  • The increase in failed crypto projects is linked to market issues post Donald Trump's presidency resumption in January 2025, leading to a significant drop in crypto prices.
  • Easy token creation platforms like pump.fun have flooded the market with meme coins and low-effort projects, resulting in a surge of failures, security breaches, and lack of investor confidence.

Read Full Article

like

9 Likes

source image

Securityaffairs

3w

read

113

img
dot

Image Credit: Securityaffairs

Russia-linked group Nebulous Mantis targets NATO-related defense organizations

  • Russian-speaking cyber espionage group Nebulous Mantis, also known as Cuba, STORM-0978, Tropical Scorpius, UNC2596, has been targeting critical infrastructure, governments, and NATO-linked entities using RomCom RAT and Hancitor since 2019.
  • Nebulous Mantis deploys RomCom via spear-phishing for espionage, lateral movement, and data theft. The group continuously evolves its C2 infrastructure using advanced evasion techniques and bulletproof hosting to maintain persistence and evade detection.
  • The APT group imitates trusted services like OneDrive to trick victims into downloading infected files hosted on Mediafire. Their multi-phase intrusions involve initial access, privilege escalation, data exfiltration, modular malware, LOTL techniques, and evasive C2 infrastructure.
  • Nebulous Mantis uses RomCom malware in multi-stage attacks involving system profiling, credential harvesting, AD/domain enumeration, lateral movement, and data staging. The group maintains persistence through registry manipulation and exhibits operational discipline in minimizing their footprint.

Read Full Article

like

6 Likes

source image

Dev

3w

read

279

img
dot

Image Credit: Dev

What do hackers know about your website?

  • One way to quickly find unprotected subdomains is to use crt.sh, which provides information based on issued certificates.
  • Using the subfinder application allows for configuration with multiple sources to find valid subdomains.
  • To check if the found domains are active, the utility dnsx can be used.
  • Another helpful tool is httpx, which not only checks if domains are alive but can also create screenshots for visual evaluation.

Read Full Article

like

16 Likes

source image

TechCrunch

3w

read

236

img
dot

Image Credit: TechCrunch

Apple notifies new victims of spyware attacks across the world

  • Apple notified multiple individuals this week who were believed to be targeted with government spyware.
  • Italian journalist Ciro Pellegrino and Dutch activist Eva Vlaardingerbroek were among those who received notifications from Apple.
  • Previous instances of such notifications have been made by companies like Apple, Google, and WhatsApp to alert users of spyware attacks.
  • The spyware campaign related to the recent Apple notifications is not yet clear, but previous cases have involved spyware developed by companies selling technology to governments.

Read Full Article

like

14 Likes

source image

Silicon

3w

read

74

img
dot

Image Credit: Silicon

Co-op IT System Partly Shutdown After Hack Attempt – Report

  • A cyber incident at the Co-op led to a partial shutdown of its IT systems, affecting services such as stock monitoring and remote access for some employees.
  • Security measures were implemented after attempts to gain unauthorized access, impacting back-office and call center services.
  • Despite the disruption, Co-op assured that stores and services like home deliveries and funeral homes are operating as usual.
  • This incident adds to the series of cyber attacks within the UK retail sector, with retailers like M&S, Morrisons, Tesco, and WH Smith facing cybersecurity challenges in recent years.

Read Full Article

like

4 Likes

source image

Securityaffairs

3w

read

332

img
dot

Image Credit: Securityaffairs

France links Russian APT28 to attacks on dozen French entities

  • France attributes cyberattacks on a dozen entities to Russia-connected APT28.
  • APT28 targeted French government bodies, local governments, DTIB, aerospace, research, think-tanks, and financial entities since 2021.
  • The cyber espionage group APT28, also known as Fancy Bear, operates out of Russia's GRU military unit 26165.
  • APT28's attack techniques involve phishing, brute-force attacks, and zero-day exploits, frequently targeting Roundcube email servers.

Read Full Article

like

20 Likes

source image

Securityaffairs

3w

read

280

img
dot

Image Credit: Securityaffairs

Indian Court ordered to block email service Proton Mail

  • Indian Court ordered a nationwide block of the privacy-oriented email service Proton Mail on April 29, 2025.
  • The High Court of Karnataka ordered the block following a complaint by a local firm alleging abusive emails and AI-generated deepfake content.
  • This is the second legal attempt within two years to block the encrypted email service in India.
  • Swiss authorities are engaging with India to prevent the block of Proton Mail, emphasizing that blocking the service harms law-abiding users without stopping cybercriminals.

Read Full Article

like

16 Likes

source image

Kitploit

3w

read

135

img
dot

Image Credit: Kitploit

Wshlient - A Simple Tool To Interact With Web Shells And Command Injection Vulnerabilities

  • Wshlient is a web shell client tool designed for interacting with web shells and command injection vulnerabilities.
  • To use Wshlient, one needs to create a text file containing an HTTP request and specify where the commands will be injected.
  • Installation of Wshlient can be done by cloning the Github repository, installing requirements using pip, and setting up a symbolic link for direct system-wide usage.
  • Users can contribute to Wshlient by testing, reporting bugs/issues, suggesting features, and even coding improvements while keeping the tool simple.

Read Full Article

like

8 Likes

source image

Schneier

3w

read

192

img
dot

WhatsApp Case Against NSO Group Progressing

  • Meta is suing NSO Group, alleging that the company hacks WhatsApp itself, not just individual users.
  • NSO Group is restricted from presenting certain evidence about its clients' identities and the nature of the targeted WhatsApp users.
  • Judge Phyllis Hamilton ruled that NSO Group contradicted itself in its arguments regarding its clients' intentions and responsibilities.
  • The case involves allegations of NSO Group's involvement in hacking WhatsApp for purposes beyond fighting terrorism or child exploitation.

Read Full Article

like

11 Likes

For uninterrupted reading, download the app