menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Securityaffairs

1M

read

150

img
dot

Image Credit: Securityaffairs

Gladinet flaw CVE-2025-30406 actively exploited in the wild

  • Security researchers at Huntress have reported active exploitation of the Gladinet CVE-2025-30406 vulnerability, affecting seven organizations and 120 endpoints.
  • The vulnerability (CVE-2025-30406) is a deserialization issue in Gladinet CentreStack and Triofox software due to the hardcoded machineKey use.
  • The flaw allows remote code execution and full server compromise if unpatched, posing a critical risk with no prerequisites other than knowing the default key values.
  • Huntress has released detection tools and urges partners to patch the vulnerability.

Read Full Article

like

8 Likes

source image

TheNewsCrypto

1M

read

314

img
dot

Image Credit: TheNewsCrypto

KiloEx Exploited for $7.5 Million in Suspected Price Oracle Attack

  • KiloEx, a decentralized exchange, experienced a security breach with a loss of $7.5 million across multiple blockchains.
  • The attacker utilized a flaw in KiloEx's price oracle system to manipulate asset prices.
  • Stolen funds include $3.3 million from Base, $3.1 million from opBNB, and $1 million from BSC.
  • KiloEx is partnering with other platforms and security teams to investigate the incident and recover the stolen funds.

Read Full Article

like

18 Likes

source image

Hackersking

1M

read

44

img
dot

Image Credit: Hackersking

Open-Source Browser For Ethical Hackers and Cybersecurity Researchers

  • An open-source browser called Venator Red has been developed for ethical hackers and cybersecurity researchers.
  • Venator Red is based on the Firefox browser and focuses on privacy, security, and user freedom.
  • The browser features no telemetry, private search options, content blocker, and enhanced privacy settings.
  • It comes with an extensive bookmarks collection, including resources like dark web search engines, database leaks, and IP address research tools.

Read Full Article

like

2 Likes

source image

Hackingblogs

1M

read

81

img
dot

Image Credit: Hackingblogs

14,000+ Fortinet Devices Compromised as New Exploit Technique Surfaces

  • A significant wave of Fortinet device hacks has been reported, with over 14,000 devices compromised globally.
  • The use of a symlink-based persistence technique by the threat actors has allowed long-term access to the compromised devices.
  • The attacks are part of a larger pattern of web-accessible compromises, and users are advised to handle the systems with caution.
  • Fortinet has provided mitigation and response measures to address the vulnerabilities and eliminate the malicious link.

Read Full Article

like

4 Likes

source image

Securityaffairs

1M

read

264

img
dot

Image Credit: Securityaffairs

New malware ‘ResolverRAT’ targets healthcare, pharmaceutical firms

  • New malware ‘ResolverRAT’ is targeting healthcare and pharmaceutical firms, using advanced capabilities to steal sensitive data.
  • ResolverRAT spreads via phishing emails using localized languages and legal lures. Victims download a malicious file triggering the malware.
  • ResolverRAT is a newly identified remote access trojan that combines advanced in-memory execution, API and resource resolution at runtime, and layered evasion techniques.
  • The threat actor targets users in multiple countries with phishing emails in native languages, often referencing legal investigations or copyright violations to increase credibility.

Read Full Article

like

15 Likes

source image

Securityaffairs

1M

read

345

img
dot

Image Credit: Securityaffairs

Malicious NPM packages target PayPal users

  • Threat actors deploy malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers.
  • "Using PayPal-related names helps these malicious packages avoid detection, making it easier for attackers to steal sensitive information.
  • Malicious NPM packages use a preinstall hook to run hidden scripts, steal system info, obfuscate data, and exfiltrate it to attacker-controlled servers for future attacks.
  • Fortinet researchers recommend watching for fake PayPal-related packages, checking network logs for odd connections, removing threats, updating credentials, and staying cautious when installing packages.

Read Full Article

like

20 Likes

source image

TechCrunch

1M

read

342

img
dot

Image Credit: TechCrunch

Silicon Valley crosswalk buttons hacked to imitate Musk, Zuckerberg’s voices

  • Silicon Valley crosswalk buttons were hacked to imitate the voices of Mark Zuckerberg and Elon Musk.
  • Videos show the crosswalk buttons playing AI-generated speech designed to sound like the two billionaires.
  • Possible hacktivism is suspected, but the reasons for the hack remain unclear.
  • The company responsible for the buttons, Polara, did not respond to requests for comment.

Read Full Article

like

20 Likes

source image

Kitploit

1M

read

251

img
dot

Image Credit: Kitploit

Torward - An Improved Version Based On The Torghost-Gn And Darktor Scripts, Designed To Enhance Anonymity On The Internet

  • Torward is an improved version of torghost-gn and darktor scripts designed to enhance anonymity on the Internet.
  • The tool prevents data leaks and forces all traffic to be routed exclusively through the Tor network, providing high-level privacy.
  • The updated version includes enhancements such as disabling IPv6 to prevent IP leaks, implementing strict iptables rules, and adjusting Tor configuration to route all traffic through Tor.
  • Future improvements include obtaining the IP from the last Tor exit node and enhancing error handling.

Read Full Article

like

15 Likes

source image

Securityaffairs

1M

read

395

img
dot

Image Credit: Securityaffairs

Tycoon2FA phishing kit rolled out significant updates

  • The operators of the Phishing-as-a-Service platform Tycoon2FA have updated their kit to enhance evasion capabilities.
  • The updates include advanced evasion tactics such as a custom CAPTCHA via HTML5 canvas, invisible Unicode in obfuscated JavaScript, and anti-debugging scripts.
  • Tycoon2FA now uses invisible Unicode characters and JavaScript Proxy objects to complicate analysis and delay script execution.
  • The phishing kit also implemented a custom HTML5 canvas-based solution to evade detection and hinder automated analysis.

Read Full Article

like

23 Likes

source image

Coinpedia

1M

read

152

img
dot

Image Credit: Coinpedia

China Fraudsters Jailed for $6M USDT Crypto Scam Targeting Indians

  • A Chinese fraud ring used fake online personas and investment platforms to steal $6 million in USDT from thousands of Indians.
  • The scheme involved building trust through social media and chat apps, promising high returns, and then shutting down.
  • Nine individuals were convicted and sentenced to prison, with Chinese authorities warning against similar online scams.
  • The fraudsters posed as successful investors, created a fake investment platform, and used fake lifestyle photos to gain credibility.

Read Full Article

like

9 Likes

source image

Securityaffairs

1M

read

372

img
dot

Image Credit: Securityaffairs

South African telecom provider Cell C disclosed a data breach following a cyberattack

  • South African telecom provider Cell C confirms a data breach after a cyberattack.
  • RansomHouse cyberattack group claims responsibility and leaks stolen data.
  • Compromised data includes personal information, financial details, and identification documents.
  • Cell C has taken immediate action, engaged cybersecurity experts, and provided guidance to affected stakeholders.

Read Full Article

like

22 Likes

source image

Hackingblogs

1M

read

94

img
dot

Image Credit: Hackingblogs

New U.S. Program Blocks Foreign Access to Americans’ Sensitive Data

  • The United States has launched a data security effort to prevent foreign adversaries from gaining access to Americans' private information.
  • China, Russia, and Iran have been acquiring American private data through legal purchases or pressuring foreign businesses.
  • The Data Security Program aims to make it harder for foreign adversaries to obtain Americans' data by implementing several measures.
  • The program protects sensitive data categories and covers foreign enterprises doing business in or with the United States.

Read Full Article

like

5 Likes

source image

Dev

1M

read

130

img
dot

Image Credit: Dev

XSS URL Analysis and SQL Injection Workflow

  • This article delves into Cross-Site Scripting (XSS) and SQL Injection vulnerabilities, explaining their workflows with examples, code samples, and flow diagrams.
  • XSS allows attackers to inject malicious scripts into web pages, leading to session hijacking or data theft; types include Stored, Reflected, and DOM-based XSS.
  • XSS exploitation involves crafting a malicious URL, sending it to the victim, executing the script, and performing malicious actions.
  • SQL Injection manipulation of SQL queries can lead to data leaks or database compromise; types include In-Band, Blind, and Out-of-Band SQL Injection.
  • An SQL Injection example showcases bypassing authentication by injecting ' OR 1=1 --.
  • SQL Injection exploitation involves crafting malicious input, executing the SQL query, and gaining control of the database.
  • Commonly used XSS payloads include alerts, stealing cookies, hijacking sessions, and keyloggers.
  • Common SQL injection payloads include authentication bypass, union-based, error-based, and blind SQL Injections.
  • Regular testing with tools like OWASP ZAP or Burp Suite is recommended to prevent vulnerabilities and protect against attackers.
  • By understanding these vulnerabilities and implementing proper security measures, the risk of attacks can be significantly reduced.

Read Full Article

like

7 Likes

source image

Dev

1M

read

426

img
dot

Image Credit: Dev

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

  • The integration of Artificial Intelligence (AI) in cybersecurity has transformed threat detection and response processes in organizations, automating tasks and improving accuracy.
  • AI technologies such as Machine Learning (ML), Deep Learning, Natural Language Processing (NLP), and Behavioral Analytics are pivotal in enhancing cybersecurity capabilities.
  • AI aids in automating responses to threats, detecting anomalies, and reducing human intervention in cybersecurity processes.
  • Machine Learning allows systems to learn and identify future threats, while Deep Learning excels at detecting complex threats.
  • Natural Language Processing helps AI interpret human language to detect phishing emails and social engineering attacks more effectively.
  • Behavioral Analytics enables AI to spot anomalous user behaviors that may indicate security threats.
  • The structured AI security workflow involves steps such as data collection, preprocessing, anomaly detection, threat assessment, automated response, and continuous learning.
  • AI can automatically respond to threats, including isolating infected systems and suspending compromised accounts for mitigation.
  • AI evolves through continuous learning, adapting to new threats and improving threat detection capabilities over time.
  • While AI bolsters cybersecurity by enhancing threat detection and incident response, it can also be exploited by hackers for creating advanced malware and deepfake technology for social engineering attacks.

Read Full Article

like

25 Likes

source image

Securityaffairs

1M

read

157

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 519 by Pierluigi Paganini – INTERNATIONAL EDITION

  • Symbolic Link trick lets attackers bypass FortiGate patches, Fortinet warns
  • Laboratory Services Cooperative data breach impacts 1.6 Million People
  • Palo Alto warns of brute-force login attempts on PAN-OS GlobalProtect gateways indicating possible upcoming attacks
  • Gamaredon targeted the military mission of a Western country based in Ukraine

Read Full Article

like

9 Likes

For uninterrupted reading, download the app