On a cold day on January 18, 2001, Maxim Igorevich Popov, a 20-year-old Ukrainian boy, nervously pushed open the doors of the American Embassy in London. He could have been mistaken for a student exchange program participant who came to get a visa, but in reality Maxim was a hacker, a member of...
Introduction
In recent years, the role of hackers has changed; in the past, these professionals were seen as dangerous criminals who needed to be kept at arm's length; meanwhile, today they are in high demand by private companies, intelligence agencies and criminal groups.
Hacking " services...
Enthusiasts have created a multifunctional platform for pentesting based on the Raspberry Pi.
Ethical hacking, or pentesting, is a fascinating field that requires deep knowledge and skills. Enthusiasts and professionals in the field of cybersecurity have acquired an interesting novelty-a...
Details about the company that was blackmailed by a dismissed information security specialist have been revealed.
Former cybersecurity consultant Vincent Cannady faces up to 20 years in prison after being charged with extorting $1.5 million. from an international IT company.
Kannady, 57, was...
The analysis shows trends of cybercriminals and their favorite attack vectors.
Kaspersky Lab has provided an overview of changes in the cyber threat landscape for the first quarter of 2024. The report notes an increase in the number of software vulnerabilities, which highlights the importance...
The world of information security has enough references to the Wild West. For example, the same division of hackers into Black and White Hat, which came from westerns: villains always wear black hats, and good guys – white.
Continuing this analogy, we can say that DDoS is a revolver that...
Table of contents
Who do you want to become
How to become a hacker
How to make money for a novice hacker
Mistakes made by novice hackers
Results
The activity of hackers is already a media brand. Harsh" techies "in hoods that "gnaw" enemy systems day and night, and sometimes even "smash" the...
If you believe the character of the movie master George Danelia, hackers have a goal and they are definitely not in danger of extinction in the near future. Only the object of hacker differentiation is traditionally not pants, but hats.
Initially, hackers were only allowed two types of...
The story of the 26-year-old kidnapper of mental injuries of Finns has ended.
26-year-old hacker Julius Aleksanteri Kivimyaki was sentenced to 6 years in prison. This was reported by local media, referring to the court's decision in the case of hacking a private psychotherapy center Vastaamo in...
ZachXBT warns that the methods of criminals are becoming more sophisticated, despite the sanctions.
The infamous North Korean hacker group Lazarus Group continues to carry out large-scale cyber attacks on cryptocurrency projects and networks. According to experts, the total amount of digital...
In Kazan, law enforcement officers detained a foreign man who is suspected of committing a crime in the field of computer information. He tried to fly to Uzbekistan, but at border control he was asked to stay to clarify the circumstances.
The 46-year-old foreigner is accused of creating, using...
The researcher reveals dangerous vulnerabilities in popular security solutions.
SafeBreach specialist Shmuel Cohen demonstrated that EDR solutions can be used as tools for conducting attacks. In the course of the study, Cohen analyzed one of the EDR systems, identifying vulnerabilities that...
The attacker was a 24-year-old Moroccan. He was detained in the municipality of Manacor by the Spanish National Police for using a bot that blocks the online appointment system for extranheria.
It is noted that the hacker expected to resell the recordings later.
So, visiting foreigners...
How does a major telecom provider deal with the consequences of hacking their networks?
Frontier Communications, one of the largest telecommunications companies in the United States, providing gigabit Internet over a fiber-optic network to millions of individuals and businesses in 25 states...
The Japanese earned millions of yen on "tuning" rare characters.
In the course of an operation to combat illegal trade in gaming resources, the cyber police of Kochi Prefecture (Japan) detained 36-year-old Yoshihiro Yamakawa. He is suspected of hacking and editing the save files of the games...
On April 9, the two-week trial of Abraham Eisenberg, who is accused of hacking the decentralized exchange Mango Markets, begins in the United States.
The Mango Markets platform, which runs on the Solana network, was hacked in October 2022. Hackers managed to withdraw assets worth $116 million...
Your home router may not be connecting to where you want it to go.
Black Lotus Labs discovered a new variant of the TheMoon malware targeting SOHO offices and IoT devices in 88 countries, which has already infected nearly 7,000 ASUS routers.
TheMoon is linked to Faceless, an anonymous proxy...
The Curio DeFi project was attacked, the damage from which Cyvers Alerts experts estimated at $16 million.
The decentralized protocol is focused on providing Web3 investors in RWA with infrastructure services to attract liquidity.
On Saturday, March 23, the Curio team warned the community...
He used the vulnerability to double his tokens and exchange them for ETH.
The creators of the blockchain game Super Sushi Samurai, which uses the Blast platform and is available via Telegram, announced the theft of $4.6 million in a cyber attack. The money was withdrawn by a white hacker who...
The developers of the Telegram game Super Sushi Samurai reported that exploiting an error in the smart contract allowed the hacker to withdraw $4.6 million from LP wallets.
Yuga Labs developer Coffee claimed that it was a double-spend attack. When the user sent the wallet balance to himself...