NEW CARDING CHAT IN TELEGRAM

hacking

  1. Teacher

    AirDAO reported hacking of the platform for $1 million

    The community-managed first-level blockchain, AirDAO, suffered a hacker attack that resulted in the loss of 126.5 ETH (~$450,000) and 41.61 million AMB (~$512,000). According to the statement, the attacker withdrew funds from the AMB/ETH pool of the Uniswap decentralized exchange. The...
  2. Teacher

    The vulnerability of the IFTTT autoposting service led to the hacking of crypto-influencers in X

    On March 21, the accounts of several crypto industry influencers in X were compromised to promote the PACKY scam token. Probably, the hacker got access through the automatic post publishing service IFTTT (If This then That). One of the victims was the adviser Andreessen Horowitz (a16z) Packy...
  3. Teacher

    Four Dragons Bitcoin exchange from Kyrgyzstan shares details of hacking

    Representatives of the Four Dragons cryptocurrency exchange from Kyrgyzstan, which suffered from hacking at the end of February, revealed to ForkLog some details of the investigation of the incident. According to them, unknown persons stole USDT from the platform's hot wallet at the time of a...
  4. Teacher

    The founder of Milady announced the hacking of NFT wallets

    Charlotte Fan, founder of the NFT projects Milady and Remilia, confirmed a security breach of Treasury addresses with millions of dollars worth of damage. The incident was initially reported by Dumpster DAO specialists. PeckShield experts noticed that suspicious transactions were preceded by...
  5. Teacher

    History of hacking and blackmail of a failed hacker

    An Idaho man has confessed to hacking into medical clinics and a police station with subsequent extortion. Robert Purbeck, known under the pseudonyms Lifelock and Studmaster, was arrested on charges of cybercrime committed between 2017 and 2018. By acquiring stolen credentials on the darknet...
  6. Teacher

    Major Apex Legends Tournament Suspended Due to Hacking

    Esports players were held hostage by cheating programs. The finals of the North American division of the popular esports discipline Apex Legends was abruptly suspended due to a violation of the "competitive integrity" of the game. An unknown attacker somehow implanted cheating programs on...
  7. Teacher

    DeFi Mosaic Finance project lost $2.4 million as a result of hacking

    The Mosaic Finance revenue farming protocol reported that wallets based on the Arbitrum network were hacked. At the same time, the project developers claim that the funds were transferred to the centralized MEXC exchange. The Mosaic Finance protocol runs on multiple blockchains. According to...
  8. Teacher

    Equate hacking of state websites to terrorism: tough position of the deputy

    In Russia, responsibility for crimes in the IT sphere may be tightened. Andrey Svintsov, Deputy Chairman of the State Duma Committee on Information Policy, Information Technologies and Communications, has taken the initiative to toughen penalties for cyber attacks on state resources. According...
  9. Teacher

    Hacking Xbox Series X is just around the corner: the network has information about the console firmware

    Publishing data reveals potential firmware vulnerabilities. An anonymous security researcher revealed information about the BIOS, as well as ROM and dump files for the AMD 4800S chip. The leak may contribute to a deeper study of the Xbox Series X game console among security professionals...
  10. Teacher

    Don't trust fonts: Canva reported three vulnerabilities leading to imminent hacking

    Graphic design requires a global review of security policies. A new study by the Australian company Canva, specializing in graphic design, revealed a number of security vulnerabilities related to fonts. Experts found three vulnerabilities in "unusual places", emphasizing that fonts are a...
  11. Teacher

    Nepalese hacker tops Hall of Fame by hacking Facebook in 1 hour

    Facebook paid a record amount to a specialist for finding a vulnerability that gave access to any account. Nepalese cybersecurity researcher Sameep Aryal made history when he discovered a vulnerability in Facebook's password reset system that allowed an attacker to take over any account without...
  12. Teacher

    Silver SAML: a new cloud hacking technique that Microsoft can't stop

    How the attack allows an attacker to mimic any user. Semperis has revealed a new attack technique called Silver SAML, which can bypass security in identity systems. The Silver SAML technique allows you to use SAML to launch attacks from an identity provider (for example, Entra ID) against...
  13. Teacher

    Cyberspace hit Cencora: the pharmaceutical giant is looking for a cure for the consequences of hacking

    It is possible that valuable data was stolen from the company's networks, but which ones… The Fortune 500 pharmaceutical company Cencora, in documents for the US Securities and Exchange Commission, reported that it had identified unauthorized access and withdrawal of information from its IT...
  14. Teacher

    Hacking of the insurer Change Healthcare destroys the business of doctors and pharmacies in the United States

    Switching to paper documents is the smallest thing that a devastating attack has brought. Last week, a cyberattack on UnitedHealth Group disrupted drug and insurance sales at pharmacies across the United States, causing significant difficulties for healthcare workers. Experts warn that the...
  15. Teacher

    Hugging Face conversion service - a loophole for hacking AI models

    A vulnerability in Safetensors causes supply chains to be compromised. Information security company HiddenLayer has identified a vulnerability in Hugging Face's Safetensors conversion service that allows an attacker to intercept AI models uploaded by users and compromise the supply chain...
  16. Teacher

    Zero-Click in the Apple world: "quick commands" lead to "quick hacking"

    How did a useful feature turn into a powerful data theft tool? In the world of technology, a new threat has been discovered that affects users of Apple products. This time, the vulnerability concerns the Shortcuts application — a tool for creating custom automated tasks that is built into the...
  17. Teacher

    American-style cybersecurity: how a series of stupid mistakes led to the hacking of the government network

    Compromise could have been avoided by applying only a few simple security measures... The US Cybersecurity and Infrastructure Protection Agency (CISA), in collaboration with the Interstate Center for Analysis and Exchange of Information (MS-ISAC), found that unknown attackers gained access to...
  18. Teacher

    Hacking Prudential Financial: how hackers revealed the secrets of one of the largest financial companies

    Prudential Financial assesses the damage caused by the cyberattack. Prudential Financial, one of the leading financial and insurance companies, was the victim of a cyberattack that exposed the data of its employees and contractors. Information about the security breach was made public in Form...
  19. Teacher

    Duelbits crypto casino lost $4.6 million as a result of hacking

    On the night of February 14, hackers attacked the Duelbits cryptocurrency casino and withdrew funds for $4.6 million due to the compromise of the private key. This was reported by CertiK analysts. According to the researchers, the attackers removed the assets stored on the platform, converted...
  20. Teacher

    Hacking the ether: how to build a digital scanner for $ 250

    From the garage to the masses — the story of an invention. Recently, wiretapping the radio intercepts of the police and firefighters has become not so easy. Previously, it was enough to purchase a scanner, adjust the frequencies, and you could enjoy the process. However, with the development of...
Top