hacking

  1. Brother

    Splunk Enterprise hacking tool threatens hundreds of world-renowned companies

    An exploit for the critical RCE vulnerability is already available for download. An independent cybersecurity researcher has released a Proof-of-Concept (PoC) exploit to exploit the RCE vulnerability CVE-2023-46214 in the popular data monitoring and analysis system Splunk, or rather in the...
  2. Lord777

    A 19-year-old teenager has pleaded guilty to hacking a betting site using a credential matching method

    On the account of the guy 60 thousand hacked accounts and 600 thousand stolen conventional units. 19-year-old Joseph Garrison from Wisconsin, USA, finally pleaded guilty to organizing a large-scale attack on a betting site. For the first time, the teenager became widely known in May of this...
  3. Lord777

    From hacking to trial: the SEC regulator punishes companies for concealing cyber attacks

    The new rules will affect the stock market and the strategy of companies. The U.S. Securities and Exchange Commission (SEC) has introduced rules requiring public companies to report cyber incidents that they consider materially significant within four days of their discovery. Such a change in...
  4. Lord777

    The damage caused by hacking of the Poloniex crypto exchange exceeded $100 million

    On November 10, an unknown attacker attacked the Poloniex cryptocurrency exchange. According to preliminary data from Arkham Intelligence, total losses exceeded $124.5 million in digital assets. Around 14:00 (UTC+3), PeckShield analysts alerted the platform and its CEO, Justin Sun, to...
  5. Lord777

    Expert Reports on hacking of a $27 million crypto wallet

    On November 12, an attacker hacked a crypto wallet totaling about $27 million in the USDT stablecoin. This was stated by on-chain detective ZachXBT. The attacked user received USDT after withdrawing from Binance about a week ago. As ZachXBT noted, the wallet also interacted with the exchange's...
  6. Carding 4 Carders

    LastPass hacking victims lost $4.4 million in a day

    In one day, at least 25 people lost $4.4 million worth of cryptocurrencies from 80 wallets. The incident was the result of a data leak from the LastPass password manager in December 2022. twitter.com An on-chain sleuth named ZachXBT reported that together with MetaMask developer Taylor...
  7. Carding 4 Carders

    Exchange Coins.ph lost $6 million in hacking

    According to analysts of The Block, the Philippine cryptocurrency exchange Coins.ph it was subjected to a hacker attack that resulted in the loss of more than $6 million in XRP coins. According to The Block, within about 30 minutes, the hacker exchanged 999,999,999 lots of XRP 13 times, and he...
  8. Carding 4 Carders

    Losses from hacking the DeFi Uranium Finance project amounted to $50 million

    A hacker who hacked the decentralized project Uranium Finance two years ago, recently transferred 3.1 million BUSD stablecoins from the BNB Chain network to Ethereum, and then laundered part of it through the cryptomixer Tornado Cash. The analytical company PeckShield reported that the attacker...
  9. Carding 4 Carders

    Chinese hackers Storm-0062 are involved in hacking Atlassian Confluence

    Three weeks of unpunished access: what were the group's goals? Microsoft said that a Chinese hacker group known as "Storm-0062" (aka DarkShadow, Oro0lxy) exploited a critical vulnerability in the Atlassian Confluence Data Center and Server starting on September 14, 2023. Atlassian has notified...
  10. Carding 4 Carders

    Avalanche Stars Arena Smart contract lost $2.9 million as a result of hacking

    A social app created by analogy with the Friend social network.tech and deployed in the Avalanche blockchain protocol, was subjected to a hacker attack. As a result of hacking, assets worth $2.9 million were withdrawn from the smart contract. Experts from PeckShield, a blockchain security...
  11. CarderPlanet

    The world's first hacking rules have provoked an aggressive response from cyberbands

    The Red Cross has proposed common rules for cyber warfare, but hackers think differently. The International Committee of the Red Cross (ICRC) has published the world's first rules of cyber warfare for civilian hackers fighting for their country. This decision comes amid the active entry of...
  12. CarderPlanet

    Hacking a gas station via Bluetooth

    It turns out that some pumps in USA are controlled via Bluetooth, so especially smart hatskers thought up using Bluetooth to exploit the vulnerability [no details], gaining access to a free gasoline pump. So an attacker from Detroit stole 3,000 liters of gasoline by hacking a gas station via...
  13. Carding

    Hacking by estimate: Spanish extortionists disguise themselves as clients of architectural organizations

    A clear and well-thought-out social engineering campaign is paying off — dozens of firms ' data is encrypted. Spain's National Police are warning of an ongoing "LockBit Locker" ransomware campaign targeting architecture companies in the country through phishing emails. "A wave of emails sent...
  14. Carding

    Secret War for Data: How Cellebrite Balances Power and Responsibility in the World of Smartphone Hacking

    The covert use of hacking technology raises questions about fairness and transparency. Cellebrite, a company known for its smartphone hacking technology, is calling on government agencies and security services to keep the use of its products secret. This is reported by TechCrunch. The company...
  15. Carding

    Remote hacking: Researchers found a backdoor in 1952 Citrix NetScaler devices

    NCC Group warns that even patches may not save you. Cybersecurity company NCC Group said in a report that nearly 2,000 Citrix NetScaler instances were compromised. Attackers exploited the recently discovered critical vulnerability CVE-2023-3519. Presumably, it was useful for installing web...
  16. Carding

    Mac in danger: The shadow market offers easy hacking of Apple PCs

    Perhaps silent cyberpirats are already running rampant on your macOS 13.2. Cybersecurity company Guardz has discovered an HVNC tool designed to hack Mac computers. The main purpose of such software is to steal confidential information and user accounts. According to Guardz, HVNC (Hidden...
  17. Lord777

    Hacking is an art form: how to learn how to hack systems and networks from scratch

    A hacker is a person who searches for and exploits vulnerabilities in computer systems and networks to achieve their goals. Hackers can be of different types: white, gray, or black hats. White hats are ethical hackers who help protect systems from attacks. Gray hats are hackers who break the law...
  18. Lord777

    How to Become a Black Hacker and Why It's a Bad Idea: Everything You Need to Know about Cybercrime

    Hacking is the art and science of breaking into computer systems and networks in order to gain unauthorized access to information or resources. Hackers are divided into different types depending on their motives and methods. The best-known and brightest members of this digital fraternity are...
  19. Tomcat

    CIA protected its top-secret hacking tools with 123ABCdef

    Many have heard of Joshua Schulte, who is accused of leaking "top-secret" hacking tools from the CIA. Schult is currently under arrest, and his case is being investigated by the court. During a recent meeting, several interesting details emerged regarding the practices of the American...
  20. B

    Useful resources for pentesters and hackers

    Hacking manuals: ▪️http://www.ehacking.net/ ▪️http://www.securitytube.net/ ▪️http://www.hacking-tutorial.com/ ▪️https://www.offensive-security.com/ ▪️http://breakthesecurity.cysecurity.org/ ▪️http://www.spacerogue.net/wordpress/ ▪️https://www.youtube.com/user/Hak5Darren...
Top