HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Trojan Chaos RAT Discovered in Arch User Repository

📟 News

Date: 22/07/2025

Author: HackMag

Developers of Arch Linux discovered three malicious packages in the Arch User Repository (AUR). These packages were used to install the Chaos remote access trojan (RAT) on Linux devices.

Read full article →


Microsoft Releases Emergency Patch: 0-Day Vulnerabilities in SharePoint Exploited in RCE Attacks

📟 News

Date: 22/07/2025

Author: HackMag

Critical zero-day vulnerabilities in Microsoft SharePoint (CVE-2025-53770 and CVE-2025-53771) have been actively exploited since the end of last week, compromising at least 85 servers worldwide.

Read full article →


Google Sues Operators of BadBox 2.0 Botnet Infecting Over 10 Million Devices

📟 News

Date: 21/07/2025

Author: HackMag

Google has filed a lawsuit against the anonymous operators of the Android botnet BadBox 2.0, accusing them of orchestrating a global fraud scheme targeting the company’s advertising platforms.

Read full article →


Malware LameHug Utilizes LLM to Generate Commands on Infected Machines

📟 News

Date: 21/07/2025

Author: HackMag

The new malware family LameHug utilizes LLM (Large Language Model) to generate commands that are executed on compromised systems running Windows.

Read full article →


Malware Hidden Inside DNS Records

📟 News

Date: 21/07/2025

Author: HackMag

Experts at DomainTools discovered that hackers are hiding malicious payloads within DNS records. This simplifies the retrieval of malware binaries, as it eliminates the need to download them from suspicious sites or attach them to emails.

Read full article →


Curl Developer Considers Ending Bug Bounties Due to AI-Generated Junk

📟 News

Date: 21/07/2025

Author: HackMag

The founder and lead developer of Curl, Daniel Stenberg, announced that due to an abundance of AI-generated junk, he is prepared to completely terminate the project’s bug bounty program. The issue is that he and other maintainers are overwhelmed with bug reports that people are creating with the help of AI.

Read full article →


Chrome Addresses Sandbox Escape Vulnerability Already Exploited in Attacks

📟 News

Date: 21/07/2025

Author: HackMag

Google has released fixes for six vulnerabilities in the Chrome browser. One of these vulnerabilities was already being exploited in real attacks to bypass the browser’s sandbox.

Read full article →


  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 12
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy