HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

FileFix Technique Used for Delivering Interlock Malware

📟 News

Date: 18/07/2025

Author: HackMag

The ransomware hacking group Interlock is distributing a Remote Access Trojan (RAT) through compromised websites. The hackers use FileFix attacks to deliver the malware.

Read full article →


Gigabyte Motherboards Vulnerable to UEFI Malware

📟 News

Date: 18/07/2025

Author: HackMag

Many models of Gigabyte motherboards utilize vulnerable UEFI firmware, which allows for the installation of bootkits that are invisible to the operating system.

Read full article →


Hackers Exploit Critical RCE Vulnerability in Wing FTP Server

📟 News

Date: 17/07/2025

Author: HackMag

Hackers began exploiting a critical vulnerability in Wing FTP Server just one day after technical details about the issue were published.

Read full article →


eSIM Vulnerabilities Allow Card Cloning and User Spying

📟 News

Date: 17/07/2025

Author: HackMag

AG Security Research researchers have discovered vulnerabilities in the eSIM technology used in modern smartphones. The issues impact the eUICC software package by Kigen, which is used by billions of devices.

Read full article →


FBI Shuts Down Websites Distributing Pirated Games

📟 News

Date: 17/07/2025

Author: HackMag

The Federal Bureau of Investigation (FBI) seized the domain names of several websites associated with pirated games. Notably, NSW2U[.]com, which Nintendo has been battling for many years, was shut down.

Read full article →


Google Gemini May Direct Users to Phishing Sites

📟 News

Date: 17/07/2025

Author: HackMag

Google Gemini for Workspace can be used to create brief email summaries that appear legitimate but contain malicious instructions and messages directing users to phishing sites.

Read full article →


GPUHammer: Rowhammer Attack Adapted for Nvidia Graphics Cards

📟 News

Date: 17/07/2025

Author: HackMag

Nvidia recommends users activate System Level Error-Correcting Code (ECC), as graphics cards with GDDR6 memory are vulnerable to the Rowhammer attack.

Read full article →


  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 13
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy