HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Coinbase fixes 2FA bug that made customers panic

📟 News

Date: 30/04/2025

Author: HackMag

Cryptocurrency exchange Coinbase has fixed a bug in its Account Activity logs that caused customers to think their credentials were compromised.
Read full article →

FBI Offers 10 million USD for information on Salt Typhoon members

📟 News

Date: 29/04/2025

Author: HackMag

The FBI offers up to 10 million USD for information about members of the Chinese hacker group Salt Typhoon and last year’s attack that had compromised multiple US telecommunications companies.
Read full article →

Process Ghosting. Circumvent antiviruses in the most dangerous way

Date: 28/04/2025

Author: Nik Zerof

One of the main priorities for hackers is to hide the execution of their malicious code. This article explains how to start processes using the Process Ghosting technique and discusses operation principles of malware detection systems.
Read full article →

Asus patches vulnerability in AMI’s MegaRAC enabling attackers to brick servers

📟 News

Date: 25/04/2025

Author: HackMag

Asus released patches for the CVE-2024-54085 vulnerability that allows attackers to seize and disable servers. The security hole affects the American Megatrends International (AMI) MegaRAC Baseboard Management Controller (BMC) software used by many server equipment manufacturers, including Asus, HPE, and ASRock.
Read full article →

Tunnels Nightmare: ISP protocols expand your pivoting capacity

Date: 24/04/2025

Author: Caster

The modern TCP/IP protocol stack includes plenty of tunneling protocols. Normally, they are used to expand production networks and build infrastructure. But in this research, I will use them as pentesting tools.
Read full article →

Improper authentication control vulnerability affects ASUS routers with AiCloud

📟 News

Date: 23/04/2025

Author: HackMag

ASUSTeK Computer Inc. fixed an improper authentication control vulnerability in routers with AiCloud. The bug allows remote attackers to perform unauthorized actions on vulnerable devices.
Read full article →

Scammers pose as FBI IC3 specialists, offer ‘assistance’ to fraud victims

📟 News

Date: 22/04/2025

Author: HackMag

According to the FBI, scammers impersonating employees of the FBI Internet Fraud Complaint Center (IC3) contact fraud victims offering them ‘assistance’ in getting their money back
Read full article →

  • 1
  • 2
  • 3
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy