menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Hackersking

3w

read

2.7k

img
dot

Image Credit: Hackersking

Why Hackers & Programmers Love HackerRank Coding Challenges

  • HackerRank is the ultimate platform for mastering coding challenges.
  • It offers a wide range of challenges to suit all skill levels and has a supportive community.
  • HackerRank provides tutorials, competitions, and interview preparation materials.
  • Solving coding challenges enhances problem-solving skills and boosts confidence.

Read Full Article

like

17 Likes

source image

Securityaffairs

3w

read

8

img
dot

Image Credit: Securityaffairs

Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship

  • The Tor Project is seeking help in deploying 200 WebTunnel bridges by the end of the year to counter government censorship.
  • Recent reports from Russia indicate increased censorship targeting the Tor network, including blocking bridges, pluggable transports, and circumvention apps.
  • WebTunnel bridges are being blocked in Russia, making it necessary to deploy more bridges to provide secure access for users.
  • The Tor Project is urging the community to help by running a WebTunnel bridge, with specific technical requirements outlined in the WebTunnel guide.

Read Full Article

like

Like

source image

Coinpedia

3w

read

320

img
dot

Image Credit: Coinpedia

Will CZ and Binance Save WazirX Users Amid Fund Freeze Allegations?

  • The ongoing issue between WazirX and Binance escalated as users claim fund freeze allegations.
  • CZ, co-founder of Binance, expressed regret but clarified he was not managing WazirX during the alleged hack.
  • Users express concerns about Binance's role in resolving the situation and unfreezing funds.
  • Questions arise regarding Binance's responsibility to assist WazirX users in this matter.

Read Full Article

like

19 Likes

source image

Securityaffairs

3w

read

434

img
dot

Image Credit: Securityaffairs

Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested

  • Operation HAECHI-V led to more than 5,500 suspects arrested and $400 million seized.
  • The operation targeted cyber frauds such as phishing, romance scams, and online gambling.
  • A voice phishing syndicate causing $1.1 billion in losses was dismantled, leading to 27 arrests.
  • INTERPOL issued a Purple Notice warning about cryptocurrency fraud involving the USDT Token Approval Scam.

Read Full Article

like

26 Likes

source image

Securelist

3w

read

259

img
dot

Image Credit: Securelist

Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT

  • Horns&Hooves campaign uses ZIP files containing JScript scripts with lookalike names of customer and partner requests, containing decoy documents related to the organization, and licenses belonging to cybercriminal group TA569.
  • The campaign hitting over one thousand users in Russia began in March 2023, changes were made to the script, while the same distribution method was employed.
  • The early samples, dating back to April and May 2023, used scripts with the HTA.extension. The DOM is used to create nodes, remove nodes, or to replace one node with another.
  • The later versions of the campaign had JS script names like the ones calling on the browser to open or purchase request variations.
  • Using a label or a linked scope, the attackers were able to make the malicious code execute when the corresponding check box in the browser window is checked.
  • The NetSupport RAT which can infiltrate the system through scam websites and fake browser updates, disguised as technical support, is used to remotely manage and gain access to infected devices.
  • BurnsRAT is also utilized by the attackers and RMS is launched as a service, with information regarding the computer sent to the server post installation.
  • Access is gained by TA569, whose security key matched that of the installation configuration file.
  • The stolen documents could be used to further the malicious campaign in the future, as they may possess sensitive corporate information.
  • Phishing scams like the Horns&Hooves campaign often are spearheaded to gain the initial foothold, with the attackers seeking encryption or may sell access to other cybercriminal organizations.

Read Full Article

like

15 Likes

source image

TheNewsCrypto

3w

read

118

img
dot

Image Credit: TheNewsCrypto

Japan Exchange DMM Bitcoin to Liquidate Assets Through SBI Group

  • DMM Bitcoin, a Japan-based exchange, is liquidating its assets and ceasing operations.
  • The exchange experienced a $320 million fraud in May 2024, affecting over 450,000 accounts.
  • All accounts and assets of DMM Bitcoin will be transferred to SBI Group in March 2025.
  • SBI VC Trade, the crypto arm of SBI Group, will handle additional crypto spot trading items previously handled by DMM Bitcoin.

Read Full Article

like

7 Likes

source image

Coinpedia

3w

read

263

img
dot

Image Credit: Coinpedia

Japan Crypto Exchange DMM Bitcoin Shuts Down Following Major Hack and Losses

  • DMM Bitcoin, one of the popular Bitcoin exchanges in Japan, has shut down following a $320 million hack in May 2024.
  • Assets, including Japanese yen and cryptocurrencies, will be transferred to SBI VC Trade before March 2025.
  • The hack exposed shortcomings in DMM Bitcoin's risk management, leading to an improvement order from Japan's Financial Services Agency.
  • This incident highlights the cybersecurity risks faced by the cryptocurrency industry and the need for regulatory control.

Read Full Article

like

15 Likes

source image

Idownloadblog

3w

read

92

img
dot

Image Credit: Idownloadblog

Proof of concept for iOS 18.0.x bug CVE-2024-44285 released, but seems unlikely to aid jailbreaking

  • Hacker @tomitokics released a proof of concept (PoC) for the iOS 18.0.x bug CVE-2024-44285.
  • The PoC includes a description of the use-after-free bug, but its potential for aiding jailbreaking seems unlikely.
  • Exploiting the bug would have a low success rate, estimated to be around 8%.
  • Only the iPad (7th generation) running iPadOS 18.0 or 18.0.1 could take immediate advantage of the bug for jailbreaking.

Read Full Article

like

5 Likes

source image

Securityaffairs

3w

read

45

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 500 by Pierluigi Paganini – INTERNATIONAL EDITION

  • 15 SpyLoan Android apps found on Google Play had over 8 million installs
  • Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia
  • Phishing-as-a-Service Rockstar 2FA continues to be prevalent
  • Zello urges users to reset passwords following a cyber attack

Read Full Article

like

2 Likes

source image

Securityaffairs

3w

read

0

img
dot

Image Credit: Securityaffairs

Hackers stole millions of dollars from Uganda Central Bank

  • Financially-motivated threat actors hacked Uganda's central bank system, stealing millions of dollars.
  • Government officials confirmed the security breach and the investigation is underway.
  • The hackers compromised central bank accounts and transferred funds to Japan and the UK.
  • UK authorities froze $7M, while Uganda's central bank recovered over half of the stolen money.

Read Full Article

like

Like

source image

Securityaffairs

3w

read

330

img
dot

Image Credit: Securityaffairs

15 SpyLoan Android apps found on Google Play had over 8 million installs

  • 15 SpyLoan apps with a combined total of 8M+ installs were found on Google Play, targeting users in South America, Southeast Asia, and Africa.
  • SpyLoan apps exploit social engineering to gain sensitive user data and excessive permissions, leading to extortion, harassment, and financial loss.
  • The researchers reported the apps to Google who notified the developers that their apps violate Google Play policies. Some apps were suspended by Google from Google Play while others were updated by the developers.
  • SpyLoan activity has surged, with malicious apps and infected devices increasing over 75% from Q2 to Q3 2024, highlighting their growing mobile threat presence.

Read Full Article

like

19 Likes

source image

Securityaffairs

3w

read

171

img
dot

Image Credit: Securityaffairs

Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia

  • Russian authorities arrested a ransomware affiliate, Mikhail Matveev, aka Wazawaka, for developing malware and ties to hacking groups.
  • The man was arrested in Kaliningrad, Russia, links to Lockbit, Conti, and BABUK operations were found.
  • Matveev faces charges under Russian law for creating malicious programs.
  • In May 2023, Matveev was charged by the US Justice Department for his alleged role in multiple ransomware attacks.

Read Full Article

like

10 Likes

source image

Hackersking

3w

read

361

img
dot

Image Credit: Hackersking

HTTP Toolkit That Probes Services, Web Servers, and Other Valuable Metadata

  • HTTPX is a powerful toolkit for website security testing and probing website links.
  • It allows running multiple probes using the retryablehttp library.
  • HTTPX features include support for multiple HTTP-based probings, auto fallback from HTTPS to HTTP, and handling edge cases for handling WAFs.
  • HTTPX requires go1.21 for installation and offers various helpful commands and features for testing websites.

Read Full Article

like

21 Likes

source image

Medium

3w

read

436

img
dot

Image Credit: Medium

Hacking AI — Understanding LLM Attacks and Prompt Injections

  • Hacking AI — Understanding LLM Attacks and Prompt Injections
  • Large language models (LLMs) process user inputs and generate responses based on learned patterns.
  • Prompt injection is a type of attack where malicious inputs are disguised as legitimate prompts.
  • To mitigate these attacks, proper input validation and access controls should be implemented.

Read Full Article

like

26 Likes

source image

Idownloadblog

3w

read

229

img
dot

Image Credit: Idownloadblog

BawAppie open sources A-Bypass jailbreak detection bypass, empowering the community to maintain in

  • BawAppie has open-sourced its A-Bypass jailbreak detection bypass project.
  • The project can now be forked and continued by other developers.
  • A-Bypass helps jailbreakers use apps without them detecting the jailbreak.
  • Other jailbreak detection bypasses, like Not a bypass and RootHide, have also emerged.

Read Full Article

like

13 Likes

For uninterrupted reading, download the app