NEW CARDING CHAT IN TELEGRAM

hackers

  1. Friend

    Windows Killer: CVE-2024-38106 Gives Hackers Direct Access to System Kernel

    The dangerous Zero-day was used long before the patch appeared. On September 2, security researcher Sergey Kornienko of PixiePoint published an analysis and demonstration of the exploitation of a critical zero-day vulnerability in the Windows kernel known as CVE-2024-38106. This privilege...
  2. Friend

    RACE: A Communication System That Even the Best Hackers Can Do

    The new DARPA project was developed based on the most stringent cryptographic standards. The US Defense Advanced Research Projects Agency (DARPA) has unveiled the source code for the RACE (Resilient Anonymous Communication for Everyone) distributed anonymous messaging system, which is in the...
  3. Friend

    Threat from China: Chinese hackers have become the main problem of German business

    Communication with foreign intelligence services increases the risks for large corporations. In recent years, cyberattacks have become a serious threat to German companies, and their number is growing rapidly. According to a recent study by the digital association Bitkom, published in Berlin...
  4. Friend

    Criminals or heroes? Young hackers are at the center of a legal scandal.

    Maltese nationalists ask not to judge the guys who saved the FreeHour service. In 2023, four students from Malta — Giorgio Grigolo, Michael Debono, Luke Bjorn Skerry, and Luke Collins — discovered a serious vulnerability in the FreeHour app, created to help students. Instead of ignoring the...
  5. Friend

    Chaos in education: hackers disrupted the work of the ministry in Guatemala

    The department answered the main question - how the attack on education in the country affected. The Ministry of Education of Guatemala officially announced a cyberattack that took place last week. As a result of the attack, the ministry's IT systems were damaged. However, the data of students...
  6. Friend

    Hackers use other people's malware and violate the bans of its authors

    Bi.Zone analysts noted that since the beginning of 2024, commercial malware, whose developers prohibit its use against organizations in the CIS countries, has been increasingly used to attack Russian companies. However, attackers disable regional restrictions and "pirated" versions of malware...
  7. Friend

    One click in Excel and your data is hackers hands

    The malware hides in a phishing Excel document. Recently, FortiGuard Labs, the research arm of Fortinet, documented a new phishing campaign that spreads malware through an attached Excel document. The analysis carried out showed that this document delivers a new version of Snake Keylogger, a...
  8. Friend

    The Dark Side of Digital Trust: EV Certificates Become a Weapon in the Hands of Hackers

    Digital signatures may not be as secure as they seem. Intrinsec has presented a report on the growing market for the use of extended validation (EV) certificates in cybercriminal schemes. The report takes a closer look at the techniques used by attackers to obtain and exploit these...
  9. Friend

    Link Shorteners and CAPTCHAs: How Hackers Turn Marketers Tools Into Cyberweapons

    How your favorite analytics tools can turn against you. Digital analytics tools such as link shorteners, location-based services, and CAPTCHAs play an important role in today's internet, helping system administrators drive traffic and marketers and advertisers deliver content to the right...
  10. Friend

    Is Messi a "dwarf" and Ronaldo "the greatest"? Hackers put on a show on Mbappe's page.

    The hacking of the player's account caused a storm of discussions. On the night of August 29, the account of French football player Kylian Mbappe on the social network X was hacked. As a result of the hack, posts with offensive statements appeared on the player's page, including about Lionel...
  11. Friend

    Alo, this is hacking: how hackers turn employee gullibility into millions of dollars

    More than 130 companies have fallen victim to social engineering. The GuidePoint Research and Intelligence Team (GRIT) has documented the activities of a highly developed hacker group with significant social engineering and network penetration skills, including the ability to communicate in...
  12. Friend

    From hunger to a million: fake pizzas have become a goldmine for hackers

    The international campaign attacks popular networks. BforeAI researchers have identified a massive phishing campaign targeting international pizza chains, resulting in significant financial losses. The investigation began after receiving information from the Singapore police about a phishing...
  13. Friend

    ASCII Smuggling: How Hackers Turned Copilot into a Personal Spy

    Invisible instructions force the AI to act against the will of its creators. A cybersecurity researcher has discovered a critical vulnerability in Microsoft 365's integrated Copilot AI assistant that allows attackers to steal sensitive data. The exploit, previously submitted to the Microsoft...
  14. Friend

    Hackers stole a billion rubles from four banks with the help of a bot

    In total, four credit institutions suffered at the hands of hackers and their bot. As it turned out, the leader of the hacker gang who robbed four banks for 1 billion rubles was an athlete from Ukraine. He turned out to be a 29-year-old boxer from the city of Sumy, Yuriy Lysenko. After moving...
  15. Friend

    Hackers paralyzed Seattle's largest airport

    How system failures caused thousands of passengers to reconsider their plans. Seattle-Tacoma International Airport (SEA-TAC) has experienced serious disruptions in its IT systems caused by a possible cyberattack. The incident, which began on August 24, caused flight delays and problems with...
  16. Friend

    Windows helped hackers hack into the industrial giant of the Russian Federation

    How one account led to the collapse of the IT infrastructure. A group of pro-Ukrainian cybercriminals successfully attacked the IT infrastructure of a Russian industrial organization, exploiting a vulnerability in the Windows operating system. The vulnerability, known since 2022, is related to...
  17. Friend

    Hackers vs. Science: Who Will Win the Battle for Isaac

    Scientists were cut off from a key tool for financing projects. Last week, the Dutch grant application system Isaac faced serious technical problems, which led to the temporary unavailability of the service. During the investigation, it turned out that attempts were made to invade the system...
  18. Friend

    Memecoins, Reddit, and Hackers: A Triangle of Deception Has Appeared in the World of Solana

    How to lose money by trusting your interlocutor. Jupiter Research has published the results of an investigation into an incident in which some users of DeFi applications on the Solana platform lost their funds. The culprit of the data leak was the malicious Bull Checker browser extension. The...
  19. Friend

    GreenCharlie: Iranian hackers penetrate the heart of U.S. politics

    The IRGC is trying to influence the US elections. The Insikt Group team has recorded a significant increase in the activity of the GreenCharlie group, which is aimed at the political and government structures of the United States. The group's activities overlap with another Iranian group...
  20. Friend

    Tropical storm and hackers: The Virgin Islands are experiencing a double crisis

    Work to restore power supply is delayed due to a sudden cyberattack. The British Virgin Electric Corporation (BVIEC) has been in serious trouble since falling victim to a cyberattack that was officially announced on Monday, August 19. The attack affected both the company's internal and external...
Top