NEW CARDING CHAT IN TELEGRAM

vulnerability

  1. Lord777

    One and a half million bitcoins at risk of theft due to the Randstorm vulnerability

    If your crypto wallet was created before 2016, you should carefully study all the risks. Bitcoin wallets created between 2011 and 2015 may be vulnerable to a new type of exploit called Randstorm. The exploit allows you to recover passwords and gain unauthorized access to a variety of wallets on...
  2. Lord777

    WinRAR vulnerability turned into a cyber weapon for attacks on government organizations

    Asian countries suffer the most, but hackers can hardly expand their activity zone. In the field of cybersecurity, a new serious threat is gaining momentum. A group of cybercriminals known as DarkCasino is exploiting a newly discovered vulnerability in the WinRAR software to launch hacking...
  3. Lord777

    Vulnerability CVE-2023-37580 in Zimbra managed to take advantage of 4 hacker groups at once

    Zero-day in a popular email client resulted in data loss for thousands of users. A zero-day vulnerability was discovered in the Zimbra email software, which was exploited by four different groups of hackers to steal email data, user credentials, and authentication tokens. Google TAG experts...
  4. Lord777

    Reptar vulnerability affecting Intel processors

    Tavis Ormandy, a security researcher at Google, has identified a new vulnerability (CVE-2023-23583) in Intel processors, codenamed Reptar, which is mainly dangerous for cloud systems running virtual machines of different users. The vulnerability can cause the system to freeze or crash when...
  5. Lord777

    Aave suspended some operations due to the vulnerability

    The Aave DeFi protocol suspended some operations after the vulnerability was discovered. The project reported that users ' funds are safe. After confirming the information, community developers have taken the following preventive measures:: * Suspended Aave V2 Ethereum and some assets on...
  6. Lord777

    Mandiant reveals consequences of Citrix NetScaler ADC/Gateway vulnerability

    Experts detail the activity of cybercriminals. Specialists of the information security company Mandiant found active exploitation of vulnerabilities in the NetScaler ADC and Gateway systems of Citrix. The issue of CVE-2023-4966 (CVSS: 9.4) was fixed at the end of August 2023, but was not made...
  7. Carding 4 Carders

    Civil servant used WinRAR vulnerability to spy on defense companies

    How does the CIA's tool relate to such a deliberate attack? The information security company Sangfor discovered a series of phishing attacks that exploit a vulnerability in WinRAR. Documents related to the geopolitical issues of Belarus and Russia serve as bait for victims, and the sender of...
  8. Carding 4 Carders

    Iron Dome Vulnerability: How Hamas Penetrated Israel's Valuable Air Defense Shield

    When high technologies lose out to numbers. On October 7, 2023, Israel's famed Iron Dome defense system, renowned for its advanced missile interception capabilities, faced an unexpected threat. Despite its historic 90% efficiency, the system was overwhelmed by a massive rocket attack from the...
  9. Carding 4 Carders

    More than 40,000 Cisco IOS XE devices infected via zero-day vulnerability

    If you're the owner, you'd better check your devices. More than 40,000 Cisco devices running on the IOS XE operating system were compromised after hackers exploited a newly discovered maximum-security vulnerability known as CVE-2023-20198 . At the moment, there is no patch or workaround, and...
  10. Carding 4 Carders

    Critical vulnerability in Cisco products: attackers gain full control over the network

    Find out if your network is secure. Cisco strongly recommends that its customers secure their devices after discovering a critical vulnerability that is currently being actively exploited by attackers, giving them full administrative control over their networks. Successful exploitation of this...
  11. CarderPlanet

    Atlassian fell into a digital trap: hackers took advantage of the privilege escalation vulnerability

    Sharing has played a cruel trick on Confluence users. On October 4, Atlassian, an Australian company specializing in the production and support of enterprise collaboration software, issued an official warning regarding CVE-2023-22515, a critical security flaw in privilege escalation in the...
  12. CarderPlanet

    iPhone security on the verge: a new 0day vulnerability caused massive attacks on users

    Apple urgently fixes a bug that allows you to take control of the device. Apple has released emergency security updates to address a new zero-day vulnerability that was exploited in attacks on iPhone and iPad users. In an official statement, Apple said that it is aware of the active...
  13. Carding

    Windows 7 has become a vulnerability: how did hackers gain access to UK military data through an outdated system?

    LockBit under suspicion: What do hackers know about British defense? Secret information about key military and intelligence facilities in the UK was published in the public domain. According to The Daily Mirror, hackers associated with the LockBit group are behind the incident. However...
  14. Carding

    Vulnerability Downfall: who is at risk and how not to become a victim?

    Owners of the Skylake, Tiger Lake, and Ice Lake processor families — this information is for you. Microsoft published recommendations for managing the risks associated with the recently disclosed vulnerability CVE-2022-40982, commonly known by the code name "Downfall". The security flaw...
  15. Carding

    Vulnerability as a business: US saves millions on cybersecurity

    The U.S. Federal Government's internal Cybersecurity Vulnerability Center accepted more than 1,300 valid reports in its first 18 months of operation. This saved about $4.35 million in system response and recovery costs, according to the program's first annual report. The Vulnerability...
  16. Carding

    Hackers with a time machine actively use the fixed Adobe ColdFusion vulnerability

    Experts assessed the breach as critical and recommended an urgent update of the vulnerable software. The US Cybersecurity Agency (CISA) has added a vulnerability with the identifier CVE-2023-26359 to the catalog of known vulnerabilities used. Experts gave it a severity rating of 9.8 out of 10...
  17. Tomcat

    Carders rob PayPal wallets through unknown vulnerability

    Cybercriminals have discovered a vulnerability in the integration of PayPal with Google Pay and are actively exploiting it for illegal money transfers. Starting on February 21 of this year, users began to notice unknown transactions in their PayPal payment histories made through Google Pay. User...
  18. Tomcat

    4G LTE vulnerability allows pretending to be any device on the mobile network

    A joint team of researchers from the Ruhr and New York Universities has developed a new attack method that allows you to impersonate a legitimate user on a mobile network. The technique, dubbed IMP4GT (IMPersonation Attacks in 4G NeTworks), exploits a vulnerability in 4G LTE, namely the lack of...
  19. Tomcat

    Vulnerability allows attackers to eavesdrop and intercept VPN connections

    Researchers at the University of New Mexico have discovered a vulnerability affecting Ubuntu, Fedora, Debian, FreeBSD, OpenBSD, macOS, iOS Android, and other Unix-based operating systems. The problem allows you to eavesdrop, intercept and interfere with the operation of VPN connections. The...
  20. Lord777

    Vulnerability in iPhone that breaks the system instantly

    If the iPhone is connected to a Wi-Fi network named "%p%s%s%s%s%n" then it will RiP. The bug can only be fixed by completely resetting the network settings. This can be done in the Settings -> General -> Reset -> Reset network settings menu. There is another way: The problem this time arises...
Top