menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Medium

4d

read

85

img
dot

Crafting a Windows Driver to Terminate Any Process

  • This driver allows users to kill any process by specifying its Process ID (PID).
  • Disabling the driver signature is required to enable its functionality.
  • Using this driver carries inherent dangers to the stability and security of the operating system.
  • Terminating essential Windows processes can lead to critical system failures, like Blue Screens of Death (BSOD).

Read Full Article

like

5 Likes

source image

Securityaffairs

4d

read

389

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 471 by Pierluigi Paganini – INTERNATIONAL EDITION

  • Ohio Lottery data breach exposed over 538,000 individuals.
  • IntelBroker claims responsibility for hacking Europol.
  • Google fixes fifth Chrome zero-day exploit of the year.
  • Citrix warns customers to manually update PuTTY version due to vulnerability.

Read Full Article

like

23 Likes

source image

Hackingblogs

4d

read

231

img
dot

Image Credit: Hackingblogs

Find Hidden Directories using Dirsearch: Fantastic Tools For recon 2024

  • Find Hidden Directories using Dirsearch
  • About dirsearch
  • Installation Guide
  • Understanding dirsearch Commands

Read Full Article

like

13 Likes

source image

Hackingblogs

4d

read

357

img
dot

Image Credit: Hackingblogs

Gobuster For Hackers : The Free and Robust tool for bruteforcing directory 2024

  • Gobuster is a powerful tool for bruteforcing directories and files on web servers.
  • To install Gobuster, use the command 'sudo apt install gobuster' on Linux.
  • You can enhance enumeration capabilities by adding additional wordlists.
  • Filtering results based on specific status codes can increase efficiency.

Read Full Article

like

21 Likes

source image

Hackingblogs

4d

read

56

img
dot

Image Credit: Hackingblogs

Waybackurls For Hackers: Ultimate and easy updated guide 2024

  • Web crawling is a crucial component in security testing for identifying security flaws and evaluating web domains' protection.
  • Waybackurls for Hackers is a tool used for web crawling, which helps in reconnaissance and vulnerability assessment.
  • Installation of Waybackurls on Kali Linux allows for harnessing the power of web crawling in vulnerability testing.
  • Waybackurls can be used to collect URLs from a target domain, restrict URLs to the main domain, obtain fetching dates of URLs, and retrieve versions of URLs.

Read Full Article

like

3 Likes

source image

Insider

4d

read

308

img
dot

Image Credit: Insider

Hackers are now targeting the children of corporate executives in elaborate ransomware attacks

  • Hackers are targeting the children of corporate executives in elaborate ransomware attacks.
  • Mandiant, a leading cybersecurity firm, reports the rise of ransomware attacks targeting executive's children.
  • Hackers are using techniques such as SIM swapping and caller ID spoofing on children's phones.
  • These attacks put an extra burden on executives who must choose between protecting customers and their families.

Read Full Article

like

18 Likes

source image

Securityaffairs

4d

read

97

img
dot

Image Credit: Securityaffairs

As of May 2024, Black Basta ransomware affiliates hacked over 500 organizations worldwide

  • Black Basta ransomware affiliates have breached over 500 organizations between April 2022 and May 2024, FBI and CISA reported.
  • The Black Basta ransomware-as-a-service (RaaS) has targeted 12 critical infrastructure sectors, including Healthcare and Public Health.
  • The group has accumulated at least $107 million in Bitcoin ransom payments and has infected over 329 victims.
  • US agencies recommend implementing various mitigations, including prompt updates, multi-factor authentication, secure remote access software, backups, and following the #StopRansomware Guide.

Read Full Article

like

5 Likes

source image

Tech Story

4d

read

113

img
dot

How to Get Nuka Cola Power Armor

  • To obtain the Nuka-Cola Power Armour in Fallout, players need to locate the World of Refreshment at the Nuka-Cola bottling factory.
  • Prepare by stocking up on ammunition, medical supplies, and appropriate weaponry.
  • Navigate through the factory, battle enemies, solve puzzles, and overcome barriers.
  • Find the Nuka-Cola Quantum Core, Nuka-Cola Power Armour Chassis, and Nuka-Cola Armour Blueprints to unlock and assemble the power armour.

Read Full Article

like

6 Likes

source image

Medium

4d

read

89

img
dot

Image Credit: Medium

A Thrilling Dive into the World of Threat Intelligence

  • Threat Intelligence is the art of turning information into insight and staying ahead of cyber threats.
  • It involves delving into concepts and techniques like malware analysis and cyber espionage.
  • Defenders use Threat Intelligence to dissect malware and develop countermeasures.
  • Through intelligence sharing, cyber spies can be unmasked and battle turned in defenders' favor.

Read Full Article

like

5 Likes

source image

Tech Story

4d

read

382

img
dot

How to Turn Off Profile Views on LinkedIn

  • LinkedIn is a popular professional networking site for establishing connections and showcasing qualifications.
  • You can turn off profile views on LinkedIn to maintain privacy or conduct secret investigations.
  • To disable profile views, go to Privacy & Settings, select Visibility, and choose your preferred browsing mode.
  • LinkedIn also provides additional privacy options for controlling who can view your connections and managing activity broadcasts.

Read Full Article

like

22 Likes

source image

Medium

5d

read

81

img
dot

Image Credit: Medium

Cyber Attacks? Probably Your Fault!

  • Cybersecurity is often imagined as a high-tech battleground where skilled hackers and sophisticated defense systems clash.
  • The reality is far less dramatic, yet no less important. In fact, 95% of cyber-attacks are not the result of direct hacking, but rather human error and internal information leaks.
  • The main cause of 95% of cybersecurity breaches is human error. These errors can be as simple as sending an email to the wrong recipient or as serious as falling for phishing scams or using weak passwords.
  • Internal leaks, whether intentional or accidental, account for a significant portion of cyber attacks.
  • According to a report by Verizon, 68 percent of data breaches in 2024 involved internal actors. However, the report might not directly highlight this fact with the specific figure of 83%.
  • Contrary to popular belief, direct hacking is not the norm without any leak from inside parties. In fact, only about 5% of cyber-attacks are due to software or firmware vulnerabilities.
  • Given these statistics, it’s clear that organizations and individuals should focus their efforts on improving internal security practices.
  • Here are some things people should stop doing to improve their cybersecurity: STOP IGNORING UPDATES, STOP USING WEAK PASSWORDS, STOP CLICKING ON SUSPICIOUS LINKS, STOP SHARING SENSITIVE INFORMATION INDISCRIMINATELY, STOP WITH THE E-SUPERMAN SYNDROME and STOP IGNORING TRAINING.
  • Participate in cybersecurity training programs and read articles like this one. These can provide valuable information on how to recognize and prevent potential security threats.
  • Remember, in cybersecurity, knowledge is power — and that applies to both sides of the equation.

Read Full Article

like

4 Likes

source image

Medium

5d

read

273

img
dot

Image Credit: Medium

Urgent Chrome Security Update: Patch Released for Zero-Day Vulnerability

  • Google has released an urgent security update for Chrome to patch a zero-day vulnerability.
  • The vulnerability, identified as CVE-2024-4671, is being actively exploited.
  • This is the second zero-day vulnerability addressed by Google this year.
  • Users are advised to update Chrome to version 124.0.6367.201/.202 for Windows and macOS, and version 124.0.6367.201 for Linux.

Read Full Article

like

16 Likes

source image

Securityaffairs

5d

read

224

img
dot

Image Credit: Securityaffairs

Ohio Lottery data breach impacted over 538,000 individuals

  • The cyber attack on the Ohio Lottery on Christmas Eve exposed the personal data of over 538,000 individuals.
  • Attackers gained access to names or other personal identifiers in combination with Social Security Numbers of the impacted individuals.
  • Ohio Lottery is providing impacted individuals free credit monitoring and identity theft protection services through IDX.
  • The DragonForce ransomware group claimed responsibility for the attack and the theft of 94GB of data.

Read Full Article

like

13 Likes

source image

Medium

5d

read

274

img
dot

Image Credit: Medium

(Bookclub) Social Engineering: The Science of Human Hacking

  • The book 'Social Engineering: The Science of Human Hacking' has received positive reviews on Amazon for its engaging writing style and accessibility.
  • Readers found the book useful for both professionals and beginners in the field of cybersecurity.
  • The emphasis on ethical considerations and the presence of a companion website with additional resources were praised by reviewers.
  • The book focuses on the psychological and human behavioral aspects of hacking, making it comparable to psychological operations in the military.

Read Full Article

like

16 Likes

source image

Securityaffairs

5d

read

278

img
dot

Image Credit: Securityaffairs

Notorius threat actor IntelBroker claims the hack of the Europol

  • The threat actor IntelBroker claims to have hacked Europol and exposed FOUO and other classified data.
  • The security breach reportedly occurred in May 2024 and impacted various Europol agencies and systems.
  • IntelBroker is selling the compromised Europol data and accepting payments in Monero cryptocurrency.
  • The same threat actor also claims to have access to a major cybersecurity company and is selling confidential logs and credentials.

Read Full Article

like

16 Likes

For uninterrupted reading, download the app