HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Google Gemini May Direct Users to Phishing Sites

šŸ“Ÿ News

Date: 17/07/2025

Author: HackMag

Google Gemini for Workspace can be used to create brief email summaries that appear legitimate but contain malicious instructions and messages directing users to phishing sites.

Read full article →


GPUHammer: Rowhammer Attack Adapted for Nvidia Graphics Cards

šŸ“Ÿ News

Date: 17/07/2025

Author: HackMag

Nvidia recommends users activate System Level Error-Correcting Code (ECC), as graphics cards with GDDR6 memory are vulnerable to the Rowhammer attack.

Read full article →


WordPress Plugin Developer for Gravity Forms Hacked, Backdoor Installed

šŸ“Ÿ News

Date: 17/07/2025

Author: HackMag

The popular WordPress plugin Gravity Forms suffered from a supply chain attack. As a result, installers from the official website were infected with a backdoor.

Read full article →


Bluetooth vulnerabilities can be used for eavesdropping and data theft

šŸ“Ÿ News

Date: 30/06/2025

Author: HackMag

Airoha Bluetooth chipsets installed inĀ dozens ofĀ audio devices from various manufacturers can beĀ used for eavesdropping andĀ theft ofĀ sensitive data.
Read full article →


More than 60 malicious NPM packages are stealing user data

šŸ“Ÿ News

Date: 29/05/2025

Author: HackMag

Socket’s Threat Research Team discovered anĀ active campaign involving dozens ofĀ malicious npm packages that collect andĀ leak information from victims’ systems.
Read full article →


MathWorks affected by ransomware attack

šŸ“Ÿ News

Date: 28/05/2025

Author: HackMag

MathWorks, Inc., anĀ American corporation specializing inĀ mathematical computing software, was affected by aĀ ransomware attack resulting inĀ service interruptions.
Read full article →


Packages intentionally destroying data discovered in NPM

šŸ“Ÿ News

Date: 26/05/2025

Author: HackMag

Socket experts discovered inĀ npm (node package manager) eight malicious packages that were downloaded from theĀ repository more than 6,200 times over theĀ last two years. All these packages could destroy data onĀ users’ workstations.
Read full article →


  • «
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • …
  • 22
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy