• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Month: 2 hours ago

Hackers Breach Transportation Companies to Steal Cargo
News

Hackers Breach Transportation Companies to Steal Cargo

2 hours ago05/11/2025HackMag2770
Proofpoint analysts have discovered a large-scale campaign in which hackers breach transportation companies and logistics operators to intercept real shipments and steal physical goods. The attacks result in multimillion-dollar losses and serious disruptions to supply chains.
CONTINUE READING 🡒
Task Manager won’t close after a Windows update
News

Task Manager won’t close after a Windows update

6 hours ago05/11/2025HackMag2230
After installing the October optional update KB5067036 on Windows 11, an issue occurs: Task Manager stops closing properly. The bug leads to an accumulation of background taskmgr.exe processes, which can seriously degrade system performance.
CONTINUE READING 🡒
Rooted Android! Why root Android in 2025?
Mobile

Rooted Android! Why root Android in 2025?

8 hours ago06/11/2025Polski Kot2660
This article explains why it makes sense to root your Android phone in 2025. You will learn about real benefits a rooted smartphone can bring and why rooting isn’t a relic of the Android 5 and CyanogenMod era.
CONTINUE READING 🡒
Espruino Pico: Program a USB Microcontroller in JavaScript and Build an Authentication Token
Stuff

Espruino Pico: Program a USB Microcontroller in JavaScript and Build…

10 hours ago01/11/2025Alexander Lykoshin2360
Despite the flood of microcontroller-based gadgets that rode the wave of Arduino’s success, only a handful use a USB flash drive form factor that plugs directly into a computer’s USB Type‑A port. One of the more intriguing…
CONTINUE READING 🡒
SesameOp backdoor uses the OpenAI Assistants API in attacks
News

SesameOp backdoor uses the OpenAI Assistants API in attacks

14 hours ago05/11/2025HackMag2570
Microsoft researchers have discovered a new backdoor, SesameOp, which uses the OpenAI Assistants API as a covert channel to communicate with its command-and-control servers.
CONTINUE READING 🡒
Amazon to block pirated apps on Fire TV Stick devices
News

Amazon to block pirated apps on Fire TV Stick devices

18 hours ago05/11/2025HackMag2680
Amazon plans to block unauthorized apps on Fire TV Stick devices in an effort to combat piracy. The new measures are intended to put an end to the era of using modified Fire TV Sticks for free…
CONTINUE READING 🡒
Android 8 Oreo Security: All the New Protection Features Explained
Mobile

Android 8 Oreo Security: All the New Protection Features Explained

22 hours ago01/11/2025Eugene Zobnin3200
Android 8 is arguably the most significant Android update in years. Oreo introduced a modular architecture that allows OS components to be updated independently, a system that limits apps’ background activity to extend battery life, and a…
CONTINUE READING 🡒
Memento Labs chief (formerly Hacking Team) confirmed that security researchers found his company’s spyware
News

Memento Labs chief (formerly Hacking Team) confirmed that security researchers…

1 day ago04/11/2025HackMag3160
The head of the Italian company Memento Labs (formerly Hacking Team), Paolo Lezzi, confirmed to the media that the Dante spyware, recently discovered by Kaspersky Lab researchers in real-world attacks, does indeed belong to his company. Lezzi…
CONTINUE READING 🡒
Windows 0-day exploited to hack European diplomats
News

Windows 0-day exploited to hack European diplomats

1 day ago04/11/2025HackMag2620
The China-linked hacking group UNC6384 (aka Mustang Panda) is conducting a large-scale cyber-espionage campaign targeting European diplomatic and government entities. According to Arctic Wolf and StrikeReady, the hackers are exploiting an unpatched Windows vulnerability related to LNK…
CONTINUE READING 🡒
Security plugin for WordPress exposed users’ personal data
News

Security plugin for WordPress exposed users’ personal data

1 day ago04/11/2025HackMag2650
A vulnerability was discovered in the Anti-Malware Security and Brute-Force Firewall plugin for WordPress that allows minimally privileged users to read arbitrary files on the server. The plugin is installed on more than 100,000 sites, but so…
CONTINUE READING 🡒
Top 5 DevOps Tools Every Engineer Should Know
DevOps

Top 5 DevOps Tools Every Engineer Should Know

1 day ago01/11/2025Martin Prankevich2690
It’s hard to imagine modern software development without a DevOps engineer who bridges development, deployment, testing, and ongoing support. To deliver a quality product, every process has to be automated and monitored. And that’s where specialized tooling…
CONTINUE READING 🡒
Hackers Attack Telecommunications Company Ribbon Communications
News

Hackers Attack Telecommunications Company Ribbon Communications

2 days ago04/11/2025HackMag2630
U.S. telecommunications company Ribbon Communications reported a compromise of its IT network, potentially involving hackers acting on behalf of a foreign state. The incident began in December 2024 but was only discovered nine months later, in September…
CONTINUE READING 🡒
Leak reveals which Pixel phones are vulnerable to Cellebrite tools
News

Leak reveals which Pixel phones are vulnerable to Cellebrite tools

2 days ago04/11/2025HackMag2840
The outlet 404 Media drew attention to a leak posted on the GrapheneOS forums. An anonymous insider using the handle rogueFed published screenshots from a closed Cellebrite briefing for law enforcement. The images show which Google Pixel…
CONTINUE READING 🡒
Zimperium: Over 760 malicious NFC apps for Android active in Eastern Europe
News

Zimperium: Over 760 malicious NFC apps for Android active in…

2 days ago04/11/2025HackMag2970
Experts at Zimperium warn of a rise in NFC malware for Android in Eastern Europe. Over the past few months, researchers have discovered more than 760 such apps using NFC attacks to steal users’ payment data.
CONTINUE READING 🡒
E‑Book DRM Explained: How Digital Books Are Protected and How Attackers Bypass It
Security

E‑Book DRM Explained: How Digital Books Are Protected and How…

2 days ago01/11/2025Oleg Afonin2930
Adobe, Amazon, Barnes & Noble — all of these companies invest heavily in protecting e‑books from copying and online distribution. Yet every time, someone finds a way to bypass or crack those protections. How does DRM work,…
CONTINUE READING 🡒
Minimal Linux x86 Bind Shell Shellcode: Building a 44-Byte Payload
Unix

Minimal Linux x86 Bind Shell Shellcode: Building a 44-Byte Payload

2 days ago01/11/2025Oleg Boytsev3370
You probably know that almost every exploit includes so‑called shellcode that runs when the exploit triggers. It might seem like writing shellcode is only for the chosen few, but it’s not as daunting as it looks. In…
CONTINUE READING 🡒
How to Troubleshoot and Fix Bluetooth Headphone Issues on Linux
Unix

How to Troubleshoot and Fix Bluetooth Headphone Issues on Linux

3 days ago01/11/2025Aleksei Zemond Pankratov3650
Getting sound working on Linux has never been straightforward, and adding wireless headphones makes it a bit more complicated. That said, on modern distributions you can usually fix it by installing a few extra packages.
CONTINUE READING 🡒
TrueOS Review: The Desktop Edition of FreeBSD
Security

TrueOS Review: The Desktop Edition of FreeBSD

3 days ago01/11/2025Eugene Zobnin3000
“An inexplicably still-walking corpse” — that’s roughly how people tend to talk about FreeBSD these days. The hype around Linux and the GPL did its job, pushing what was once the most popular server OS to the…
CONTINUE READING 🡒
TempleOS Demystified: Understanding the “Divine” Operating System and Avoiding Common Pitfalls
Security

TempleOS Demystified: Understanding the “Divine” Operating System and Avoiding Common…

4 days ago01/11/2025apismenny2960
Hello, my brother! Today we’re going to explore one of the most intriguing operating systems of our time. TempleOS is only 17.5 MB, compiles on the fly, includes the full text of the Bible, supports 64-bit multi-core…
CONTINUE READING 🡒
How Law Enforcement Cracks Passwords: Tools and Techniques Used Against Hackers
Security

How Law Enforcement Cracks Passwords: Tools and Techniques Used Against…

4 days ago01/11/2025Oleg Afonin3470
Hackers, fraudsters, security professionals, law enforcement, and intelligence agencies—all of them, under the right circumstances, may try to access information protected by passwords. And while the tools used by hackers and government agencies are largely the same,…
CONTINUE READING 🡒
1 2 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com