hack

  1. Teacher

    FCKeditor: Hackers use 14-year-old editor to hack university and government websites

    A clear example of how non-updated software harms user security. Cybercriminals use an outdated CMS content editor that was discontinued 14 years ago to manipulate search results and direct users to malicious sites or fraudulent resources. The main tactic of attackers is to use so-called open...
  2. Teacher

    Hollywood cried: LAX VIP clients were the victim of a large-scale hack

    The leak of 2.5 million records casts a shadow on the reputation of the international airport. A well-known hacker under the pseudonym IntelBroker, responsible for hacking General Electric, Hewlett Packard Enterprise and DC Health Link , claims that this time he managed to break into the...
  3. Teacher

    How to hack Apple and get $2.5 million: a story of betrayal and confession

    Apple thanked the hacker arrested for hacking the company's systems. A cybersecurity researcher who previously reported several vulnerabilities in Apple products is accused of breaking into Apple's internal infrastructure and defrauding the corporation of $2.5 million through gift cards and...
  4. Brother

    Lush hack: passports and financial documents of a major cosmetics manufacturer were stolen

    What does the company expect if its data becomes publicly available? The British company Lush, a well-known global manufacturer of cosmetics and bath bombs, was subjected to a cyber attack. Hacker group Akira claimed responsibility for the attack, saying it stole 110 GB of data, including...
  5. Brother

    Socket infrastructure protocol lost $3.3 million in hack

    The team at cross-chain bridge aggregator Socket reported an attack that resulted in the protocol losing $3.3 million. “There was a security incident at Socket that affected infinite contract approval wallets. We have identified the issue and have suspended the affected contracts,” the...
  6. Brother

    Credit protocol Radiant Capital lost $4.5 million in hack

    Cross-chain decentralized lending protocol Radiant Capital has confirmed the hack of a new liquidity pool based on the Arbitrum network. Hackers managed to withdraw 1,900 ETH (about $4.5 million). According to blockchain security company PeckShield, attackers took advantage of a known...
  7. Brother

    CloudSEK Reveals OAuth 2.0 Hacking Method to Compromise Google Accounts

    According to a report provided by CloudSEK, a new hacking method allows attackers to exploit the functionality of the OAuth 2.0 authorization protocol to compromise Google accounts. This method allows you to maintain valid sessions by regenerating cookies, even after changing your IP address or...
  8. Brother

    A new way to hack Windows 10 and 11 using DLL substitution

    An attacker can execute arbitrary code without elevating privileges. Security company Security Joes identified a new version of the method of intercepting the search order for DLL libraries, which can be used by attackers to bypass security mechanisms and execute malicious code on systems...
  9. Brother

    Hackers hack iPhone through keyloggers in virtual keyboard

    What you need to know about protecting your device. Recently, it was discovered that hackers found a way to bypass the iPhone's security systems using third-party keyboards. According to a report by Russell Kent-Payne of Certo Software, attackers use these keyboards to record personal messages...
  10. Brother

    KyberSwap Hack: Math helped hacker steal $47 million

    Representatives of the exchange urged users to withdraw funds immediately. Representatives of the decentralized exchange KyberSwap on November 23 reported on the hacking of the Elastic Pools liquidity pool, as a result of which the hacker withdrew about $47 million. The project team recommends...
  11. Lord777

    Hack Long Beach: municipal services of the city are forced to go offline

    Could a ransomware virus have caused so much noise in government structures? The authorities of the city of Long Beach, California, reported a cyber attack that occurred last Tuesday, November 14. To eliminate the threat, a significant part of the city's information resources was temporarily...
  12. Lord777

    The situation on Wall Street after the ICBC hack

    Dealing with multibillion-dollar losses and lessons for the financial world. The Industrial and Commercial Bank of China brokerage firm in the United States was subjected to a large-scale cyber attack, as a result of which even corporate email stopped working, forcing employees to switch to...
  13. Carding 4 Carders

    Okta at the center of the scandal: new details of the hack

    Okta, which provides identity tools such as multiple authentication and single sign-on for thousands of businesses, has experienced a security breach in its customer support department. According to information from KrebsOnSecurity, the incident affected a "very small number" of customers...
  14. Carding 4 Carders

    Microsoft introduces new security standards after US State Department hack

    Chinese hackers have taught a lesson, forcing the company to prioritize cybersecurity. After the Chinese hacker group Storm-0558 hacked dozens of corporate and government Exchange and Microsoft 365 accounts in July, Microsoft increased the storage period for audit logs in Microsoft Purview...
  15. Carding 4 Carders

    Ways to hack other people's crypto wallets

    Phishing The bottom line is that the thief registers a domain that is almost identical to the domain in the bitcoin wallet. We open it, and we are automatically redirected to a phishing site. The resource looks no different from the official one, only the domain has changed the three letters...
  16. P

    [BUY] Premium US Bank Database For Sale | Latest 2023 1M+ Bank Credential

    [ 🕶 USA / United States Bank Database For sale Premium Version Latest 2023. Over 1M+ Bank Data For Sale. Limited Time Offer! Price: 5 Million USD. ($5M) US SNN Over 500k SSN. For Sale: Price: $$$ negotiable Contacts: Jabber: db4sale@xmpp.is qTox...
  17. CarderPlanet

    The identities of 6,800 former Sony employees could be stolen in a hack

    The division responsible for the release of the PlayStation, did not survive the cyber battle with the Clop group. Sony Interactive Entertainment (SIE), a division of the well – known company responsible for the development of PlayStation consoles, confirmed the data leak of its former...
  18. Carding

    Sourcegraph hack: Hacker made users feel like Uber and Dropbox developers

    But users paid for it with their data. Using an authentication key that was accidentally published in Sourcegraph's open source code, the attacker gained administrative access to the platform's functions. This resulted in a leak of data from the servers, including license keys, names, and email...
  19. Carding

    Kroll Hack Leaks FTX, BlockFi, and Genesis User Data

    Consulting giant Kroll announced that a SIM-swap attack on one of its employees resulted in the theft of user data from several major cryptocurrency platforms. The fact is that FTX, BlockFi and Genesis used the services of Kroll in connection with their bankruptcy cases in order to return part...
  20. Carding

    Balancer hack damage estimated at $900,000

    A hacker who took advantage of a vulnerability in the DeFi programmable liquidity platform Balancer withdrew about $900,000 from the protocol. According to on-chain data, after the attack, the attacker’s address received two transactions for $636,812 and $257,527 in DAI stablecoins. The...
Top