HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Abandoned AWS S3 buckets could be used in attacks targeting supply chains

📟 News

Date: 09/02/2025

Author: HackMag

watchTowr discovered plenty of abandoned Amazon S3 buckets that could be used by attackers to deliver malware and backdoors to government agencies and large corporations.
Read full article →


Hackers exploit RCE vulnerability in Microsoft Outlook

📟 News

Date: 08/02/2025

Author: HackMag

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned Federal Civilian Executive Branch (FCEB) Agencies that they have to secure their systems from ongoing attacks exploiting a critical vulnerability in Microsoft Outlook by February 27, 2025.
Read full article →


768 vulnerabilities were exploited by hackers in 2024

📟 News

Date: 07/02/2025

Author: HackMag

According to VulnCheck, 768 CVEs were registered as exploited in real-life attacks in 2024. This is 20% greater compared to 2023 when hackers exploited 639 vulnerabilities.
Read full article →


Let’s Encrypt to stop sending expiration notification emails

📟 News

Date: 06/02/2025

Author: HackMag

The nonprofit organization announced that, starting June 4, 2025, it will stop sending expiration notification emails to subscribers. The primary reason behind this decision is that providing expiration notifications costs Let’s Encrypt tens of thousands of dollars per year.
Read full article →


Google patches Android zero-day vulnerability exploited by hackers

📟 News

Date: 05/02/2025

Author: HackMag

Google released the February set of patches for Android. In total, they fix 48 bugs, including a kernel zero-day vulnerability actively exploited by hackers.
Read full article →


PyPI introduces a project archival system to combat malicious updates

📟 News

Date: 03/02/2025

Author: HackMag

The Python Package Index (PyPI) introduces a new project archival system: a project can now be archived to notify users that it’s not expected to be updated any time soon.
Read full article →


Critical RCE vulnerability fixed in Cacti

📟 News

Date: 01/02/2025

Author: HackMag

A critical vulnerability has been discovered in the open-source Cacti framework: it enables an authenticated attacker to remotely execute arbitrary code.
Read full article →


  • «
  • 1
  • …
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy