menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Dev

3w

read

118

img
dot

Image Credit: Dev

Understanding Baiting in Cybersecurity: How It Works and How to Protect Yourself

  • Baiting is a deceptive tactic by cybercriminals to exploit human curiosity or greed, posing a significant cybersecurity threat.
  • It leverages enticements like free software or USB drives to trick victims into compromising security.
  • Understanding baiting is crucial to protect against social engineering attacks, focusing on prevention and awareness.
  • Baiting works by exploiting curiosity and greed, encouraging victims to interact with malicious content.
  • Common baiting methods include physical bait like infected USB drives, online bait with malware downloads, and email bait through phishing.
  • Real-world examples showcase the impact of baiting, emphasizing the need for vigilance and caution.
  • Protecting against baiting involves skepticism, source verification, software updates, security tools, and education.
  • For organizations, security policies, training, network solutions, monitoring, and reporting are essential.
  • Awareness plays a vital role in preventing baiting, requiring recognition of red flags and critical thinking to avoid falling victim.
  • A combination of awareness, skepticism, and safe practices is key to defending against baiting attacks.

Read Full Article

like

7 Likes

source image

Medium

3w

read

417

img
dot

Image Credit: Medium

How hackers are weaponizing your digital life without ever cracking a password

  • Hackers are weaponizing digital lives without cracking passwords.
  • Hackers build accurate profiles of targets using data from social media, online stores, fitness apps, and public records.
  • Social engineering is the new weapon where hackers exploit personal information instead of hacking passwords.
  • To defend against attacks, one should be stingy with personal details, lock down privacy settings, use fake answers to security questions, and be skeptical of personalized messages.

Read Full Article

like

25 Likes

source image

Dev

3w

read

109

img
dot

Image Credit: Dev

Understanding Packet Sniffing: Risks, Uses, and How to Protect Your Data

  • Packet sniffing is a technique used in cybersecurity to monitor and analyze network traffic, allowing insights into data transmission.
  • Packet sniffing can be both beneficial for troubleshooting network issues and risky when exploited by hackers to intercept sensitive information.
  • Common tools for packet sniffing include Wireshark, tcpdump, and Cain & Abel, which provide capabilities to capture and analyze network traffic.
  • Packet sniffing is essential for network security, helping to monitor traffic, troubleshoot issues, and optimize network performance.
  • While packet sniffing has legitimate uses in network management, it can also be maliciously used to intercept sensitive data like login credentials and financial information.
  • There are hardware and software packet sniffers, with hardware devices offering high accuracy and software tools being widely accessible and versatile.
  • Protecting against packet sniffing risks involves encryption, using secure protocols, network segmentation, monitoring, security audits, and software updates.
  • Encryption through SSL/TLS and VPNs, secure protocols like HTTPS, and regular security audits play a crucial role in safeguarding data from packet sniffing.
  • Network segmentation, monitoring, and staying updated with security measures are essential practices for protecting against packet sniffing threats.
  • Understanding packet sniffing is vital for those concerned about network security, enabling them to defend against attacks and maintain a secure digital environment.

Read Full Article

like

6 Likes

source image

Kitploit

3w

read

70

img
dot

Image Credit: Kitploit

Scrapling - An Undetectable, Powerful, Flexible, High-Performance Python Library That Makes Web Scraping Simple And Easy Again!

  • Scrapling is a high-performance, intelligent web scraping library for Python that adapts to website changes and outperforms popular alternatives.
  • It provides features like dynamic loading, automation, anti-bot protection bypass, smart element tracking, and flexible selection methods.
  • Scrapling offers lightning-fast HTTP requests, memory efficiency, and fast JSON serialization.
  • Developer-friendly features include a powerful navigation API, rich text processing, auto selectors generation, and familiar API.
  • Installation is simple using pip and browsers' dependencies can be installed by running a command.
  • The library allows fetching websites with interfaces like Fetcher, StealthyFetcher, and PlayWrightFetcher.
  • Scrapling's advanced parsing features include smart navigation, content-based selection, finding similar elements, and handling structural changes.
  • The article also compares Scrapling's performance with popular Python libraries like Scrapy and Lxml in text extraction and extraction by text speed tests.
  • The library addresses common questions in FAQs and emphasizes educational and research purposes only with a BSD-3 license.
  • Contributions are welcome, with known issues highlighted, acknowledgments given, and references to related projects.
  • Scrapling is designed and crafted by Karim Shoair, emphasizing its high functionality, ease of use, and performance benefits.

Read Full Article

like

4 Likes

source image

Securityaffairs

3w

read

70

img
dot

Image Credit: Securityaffairs

A large-scale phishing campaign targets WordPress WooCommerce users

  • A large-scale phishing campaign is targeting WordPress WooCommerce users.
  • Threat actors are using a fake security alert to distribute a 'critical patch' that actually contains a backdoor.
  • The phishing campaign resembles a previous attack from December 2023, with similarities in tactics and techniques.
  • Once the fake patch is downloaded, it creates a hidden administrator account and installs web shells, giving attackers full control over the server.

Read Full Article

like

4 Likes

source image

Securityaffairs

3w

read

70

img
dot

Image Credit: Securityaffairs

PoC rootkit Curing evades traditional Linux detection systems

  • Researchers created a PoC rootkit named Curing that uses Linux's io_uring feature to evade traditional system call monitoring.
  • Curing is a proof-of-concept rootkit that utilizes io_uring for performing tasks without syscalls, making it undetectable by security tools.
  • io_uring is a Linux API for asynchronous I/O that bypasses system calls, making syscall-based security tools ineffective.
  • Many Linux EDRs are unable to monitor io_uring-based activity, posing a risk to current Linux security solutions.

Read Full Article

like

4 Likes

source image

Securityaffairs

3w

read

101

img
dot

Image Credit: Securityaffairs

Attackers chained Craft CMS zero-days attacks in the wild

  • Threat actors have exploited two vulnerabilities in Craft CMS to breach servers and steal data.
  • The vulnerabilities, CVE-2025-32432 and CVE-2024-58136, allowed remote code execution and input validation flaws in Craft CMS and the Yii framework.
  • Attackers exploited the first vulnerability to upload a PHP file manager, and then used the second vulnerability to execute PHP code and compromise the server.
  • The vulnerabilities have been fixed, and indicators of compromise have been released by Orange Cyberdefense's CSIRT.

Read Full Article

like

6 Likes

source image

Hackingblogs

3w

read

5

img
dot

Image Credit: Hackingblogs

Indian Cyber Force Breaches Pakistan’s Largest Bank, HBL, Exposing Employee Portal

  • Indian Cyber Force breaches Pakistan's largest bank, HBL, exposing employee portal.
  • The hack reveals whole IBANs and account numbers in plaintext linked to bank names and employee IDs.
  • Systemic vulnerabilities during batch updates are suspected to be the cause.
  • HBL breach includes sensitive employee financial information, account details, salary systems, and more.

Read Full Article

like

Like

source image

Medium

3w

read

255

img
dot

Image Credit: Medium

The Role of Exotic Top-Level Domains (.st,

  • Underground forums and dark web marketplaces increasingly use exotic country-code top-level domains (ccTLDs) like .st, .to, and .su for anonymity and evasion tactics.
  • Exotic ccTLDs offer benefits like low cost, rapid registration, and anonymity, making them attractive to illicit communities.
  • These exotic TLDs provide takedown resistance, registration anonymity, redundancy, and branding flexibility, aiding in forum operators' OPSEC.
  • Case studies of forums like RaidForums, BreachForums, and Nulled demonstrate both the successes and vulnerabilities of using exotic ccTLD strategies.
  • Exotic ccTLD strategies face vulnerabilities like public WHOIS exposure, geopolitical shifts, registrar compliance issues, and a false sense of security.
  • Comparison between Tor's .onion addresses and exotic ccTLDs shows that while both offer anonymity, .onion addresses provide stronger encryption and censorship resistance.
  • Future decentralized naming systems like ENS and Handshake may provide enhanced censorship resistance and privacy but face challenges in adoption and integration.
  • Exotic ccTLDs are essential for underground forums' OPSEC but come with weaknesses that cybersecurity defenders should monitor while considering decentralized naming systems for the future.

Read Full Article

like

15 Likes

source image

Securityaffairs

3w

read

96

img
dot

Image Credit: Securityaffairs

Storm-1977 targets education sector with password spraying, Microsoft warns

  • Threat actor Storm-1977 is targeting the education sector with password spraying attacks on cloud tenants.
  • The threat actor uses AzureChecker.exe to identify password spray targets and download encrypted data.
  • Microsoft warns about the risks faced by containerized assets like Kubernetes clusters and suggests security measures to protect them.
  • Key threats to containerized assets include compromised accounts, vulnerable/misconfigured images, misconfigurations exposing APIs, app-level attacks, node-level attacks, and unauthorized traffic.

Read Full Article

like

5 Likes

source image

Kitploit

3w

read

193

img
dot

Image Credit: Kitploit

VulnKnox - A Go-based Wrapper For The KNOXSS API To Automate XSS Vulnerability Testing

  • VulnKnox is a powerful command-line tool written in Go that interfaces with the KNOXSS API.
  • It automates the process of testing URLs for Cross-Site Scripting (XSS) vulnerabilities using the advanced capabilities of the KNOXSS engine.
  • The tool supports various features like configurable retries and timeouts, GET, POST, and both HTTP methods, Advanced Filter Bypass (AFB), Flash Mode, CheckPoC verification, concurrent processing with configurable parallelism, and more.
  • VulnKnox also provides detailed output with color-coded results, supports custom headers for authenticated requests, proxy integration, and Discord webhook integration for notifications.

Read Full Article

like

11 Likes

source image

Hackingblogs

3w

read

105

img
dot

Image Credit: Hackingblogs

Microsoft Defender Error Triggers Data Leak: ANY.RUN Users Unknowingly Expose Sensitive Corporate Files

  • Microsoft Defender error flags legitimate Adobe Acrobat Cloud links as malicious.
  • Users of ANY.RUN malware analysis tool unknowingly uploaded private company files publicly.
  • Over 1,700 private documents were exposed, raising concerns about platform communication and data protection.
  • ANY.RUN converted the analyses to private mode to prevent further data exposure, but some users continued to upload confidential documents.

Read Full Article

like

6 Likes

source image

Securityaffairs

3w

read

74

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 521 by Pierluigi Paganini – INTERNATIONAL EDITION

  • African multinational telco giant MTN Group disclosed a data breach
  • CEO of cybersecurity firm charged with installing malware on hospital systems
  • JPCERT warns of DslogdRAT malware deployed in Ivanti Connect Secure
  • SAP NetWeaver zero-day allegedly exploited by an initial access broker

Read Full Article

like

4 Likes

source image

Securityaffairs

3w

read

436

img
dot

Image Credit: Securityaffairs

African multinational telco giant MTN Group disclosed a data breach

  • MTN Group disclosed a data breach that exposed subscribers’ personal information.
  • MTN Group is a South African multinational telecommunications company with over 290 million subscribers.
  • The data breach did not impact core network, billing systems, and financial services infrastructure.
  • MTN is notifying impacted customers and urging them to take security precautions.

Read Full Article

like

26 Likes

source image

Kitploit

3w

read

392

img
dot

Image Credit: Kitploit

Camtruder - Advanced RTSP Camera Discovery and Vulnerability Assessment Tool

  • Camtruder is a high-performance RTSP camera discovery and vulnerability assessment tool written in Go.
  • It efficiently scans and identifies vulnerable RTSP cameras across networks using various authentication methods and path combinations, with support for both targeted and internet-wide scanning capabilities.
  • The tool comes with advanced scanning capabilities, screenshotting capability, location-based search, comprehensive authentication testing, smart path discovery, and high-performance architecture.
  • Camtruder requires Go 1.19 or higher, ffmpeg (for screenshot functionality), and sufficient system resources for large-scale scans.

Read Full Article

like

23 Likes

For uninterrupted reading, download the app