• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: HackMag

Critical Vulnerability in WD My Cloud Allows Remote Command Injection
News

Critical Vulnerability in WD My Cloud Allows Remote Command Injection

1 month ago06/10/2025HackMag2310
Western Digital has released firmware updates for several My Cloud NAS models. The update fixes a critical vulnerability that could be used for remote execution of arbitrary commands.
CONTINUE READING 🡒
Gemini Trifecta vulnerabilities made the Gemini AI assistant steal data
News

Gemini Trifecta vulnerabilities made the Gemini AI assistant steal data

1 month ago06/10/2025HackMag2120
Researchers have disclosed details of three already-fixed vulnerabilities in Google’s Gemini AI assistant, collectively dubbed Gemini Trifecta. If successfully exploited, these issues allowed attackers to trick the AI into participating in data theft and other malicious activity.
CONTINUE READING 🡒
DrayTek patches an RCE vulnerability in its routers
News

DrayTek patches an RCE vulnerability in its routers

1 month ago06/10/2025HackMag2350
DrayTek, a networking equipment manufacturer, has issued an advisory about a vulnerability that affects several Vigor router models. The flaw allows remote, unauthenticated attackers to execute arbitrary code.
CONTINUE READING 🡒
Hackers stole Discord users’ data and identity documents
News

Hackers stole Discord users’ data and identity documents

1 month ago06/10/2025HackMag1830
Hackers stole payment information and personal data (including real names and identity documents) of some Discord users. The attack occurred on September 20, 2025 and is linked to the compromise of a third-party provider that supplies the…
CONTINUE READING 🡒
Eight-Year-Old Vulnerability Found in the Unity Engine
News

Eight-Year-Old Vulnerability Found in the Unity Engine

1 month ago06/10/2025HackMag5100
A vulnerability has been discovered in the Unity game engine that has existed since 2017. The issue can be exploited for code execution on Android and for privilege escalation on Windows. Valve’s developers have already updated Steam,…
CONTINUE READING 🡒
The Crimson Collective hacking group claims to have stolen 570 GB of data from Red Hat.
News

The Crimson Collective hacking group claims to have stolen 570…

1 month ago02/10/2025HackMag4260
The ransomware group Crimson Collective has claimed to have stolen 570 GB of data from 28,000 internal Red Hat repositories. Company representatives confirmed that one of its GitLab instances was breached.
CONTINUE READING 🡒
Hackers Are Sending SMS via Vulnerable Milesight Industrial Routers
News

Hackers Are Sending SMS via Vulnerable Milesight Industrial Routers

1 month ago02/10/2025HackMag2540
Fraudsters are exploiting unsecured Milesight industrial routers to send out phishing SMS messages. Sekoia specialists discovered that such campaigns have been ongoing since 2023.
CONTINUE READING 🡒
Internet access in Afghanistan is starting to be restored
News

Internet access in Afghanistan is starting to be restored

1 month ago02/10/2025HackMag2660
Analysts from the international organization NetBlocks reported that after two days of a complete shutdown, internet connections in Afghanistan have begun to be restored. Meanwhile, the country’s authorities stated that the outages were caused by aging fiber-optic…
CONTINUE READING 🡒
New Android banking trojan Klopatra uses VNC to control infected smartphones
News

New Android banking trojan Klopatra uses VNC to control infected…

1 month ago02/10/2025HackMag2800
An Android banking trojan and RAT called Klopatra masquerades as an IPTV and VPN app and has already infected more than 3,000 devices. The malware is a trojan capable of monitoring the device’s screen in real time,…
CONTINUE READING 🡒
AI to detect ransomware in Google Drive
News

AI to detect ransomware in Google Drive

1 month ago02/10/2025HackMag1810
Google has introduced a new AI tool designed for Drive for desktop. The model is said to be trained on millions of real ransomware samples and can pause syncing to reduce the damage from a ransomware attack.
CONTINUE READING 🡒
Tile Trackers Transmit Data in Plaintext
News

Tile Trackers Transmit Data in Plaintext

1 month ago01/10/2025HackMag2100
A group of researchers from the Georgia Institute of Technology claims that Tile Bluetooth trackers transmit identifying data in plaintext. This makes it easy to identify and track their owners.
CONTINUE READING 🡒
MatrixPDF Turns PDF Files into Phishing Lures
News

MatrixPDF Turns PDF Files into Phishing Lures

1 month ago01/10/2025HackMag2440
A new phishing toolkit, MatrixPDF, has been discovered that allows attackers to turn ordinary PDF files into interactive lures that bypass email security and redirect victims to sites for credential theft or malware downloads.
CONTINUE READING 🡒
Critical sudo vulnerability is under active exploitation
News

Critical sudo vulnerability is under active exploitation

1 month ago01/10/2025HackMag3000
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that hackers are actively exploiting a critical vulnerability (CVE-2025-32463) in the sudo utility, which allows commands to be executed on Linux with root-level privileges.
CONTINUE READING 🡒
Internet Completely Shut Down Across Afghanistan
News

Internet Completely Shut Down Across Afghanistan

1 month ago01/10/2025HackMag2270
According to specialists from NetBlocks and Cloudflare, on September 29, 2025, a complete internet shutdown was imposed in Afghanistan. Analysts reported that internet service providers in the country were disconnected in stages, and telephone service is also…
CONTINUE READING 🡒
Japan’s largest brewer halted operations after a hacker attack
News

Japan’s largest brewer halted operations after a hacker attack

1 month ago30/09/2025HackMag2010
Asahi Group Holdings (hereinafter, Asahi), the producer of Japan’s best-selling beer, suffered a cyberattack that disrupted operations at multiple production sites. The incident affected order intake and delivery processes, which had to be suspended. The call center…
CONTINUE READING 🡒
Brave to add Ask Brave AI search feature
News

Brave to add Ask Brave AI search feature

1 month ago30/09/2025HackMag2190
The developers at Brave Software, the company behind the privacy-focused browser and search engine, have introduced the Ask Brave feature, which combines search and an AI chat into a single interface.
CONTINUE READING 🡒
F-Droid developers criticize Android’s restrictions on sideloading third-party apps
News

F-Droid developers criticize Android’s restrictions on sideloading third-party apps

1 month ago30/09/2025HackMag3440
Recently, Google announced that starting in 2026, only apps from verified developers will be installable on certified Android devices. Representatives of F-Droid say that if developers operating outside the Google Play store are required to undergo verification,…
CONTINUE READING 🡒
UK government to allocate £1.5 billion to Jaguar Land Rover due to cyberattack
News

UK government to allocate £1.5 billion to Jaguar Land Rover…

1 month ago30/09/2025HackMag2070
The UK government will provide Jaguar Land Rover with a government-backed loan of £1.5 billion ($2 billion) to restore its supply chain after a large-scale cyberattack that forced the automaker to halt production.
CONTINUE READING 🡒
Hackers asked a BBC journalist to help them hack a company
News

Hackers asked a BBC journalist to help them hack a…

1 month ago30/09/2025HackMag1960
Operators of the Medusa ransomware offered a large sum of money to a BBC employee and wanted to use them as an insider for a cyberattack on the media company.
CONTINUE READING 🡒
Akira ransomware hacks SonicWall SSL VPN and bypasses multi-factor authentication
News

Akira ransomware hacks SonicWall SSL VPN and bypasses multi-factor authentication

1 month ago29/09/2025HackMag3010
Arctic Wolf experts warn that Akira ransomware attacks on SonicWall SSL VPN devices continue to evolve. Hackers are successfully logging into accounts even with multi-factor authentication (MFA) enabled using one-time passwords (OTP). It is believed that the…
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 7 8 9 … 22 23 24 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com