• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: News

Privilege escalation vulnerability in Google Cloud resulting in sensitive data leaks finally patched
News

Privilege escalation vulnerability in Google Cloud resulting in sensitive data…

04.04.202516/06/2025HackMag2210
Tenable Research revealed details of a recently patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run enabling an attacker to gain access to container images and even inject malicious code into them.
CONTINUE READING 🡒
Hackers abuse MU plugins to inject malicious payloads to WordPress
News

Hackers abuse MU plugins to inject malicious payloads to WordPress

01.04.202517/04/2025HackMag1890
According to Sucuri, hackers store malicious code in the MU-plugins (Must-Use Plugins) directory in WordPress and execute it while remaining undetected.
CONTINUE READING 🡒
Zero-day vulnerability in Windows results in NTLM hash leaks
News

Zero-day vulnerability in Windows results in NTLM hash leaks

28.03.2025HackMag2090
Security experts reported a new zero-day vulnerability in Windows that enables remote attackers to steal NTLM credentials by tricking victims into viewing malicious files in Windows Explorer.
CONTINUE READING 🡒
Cloudflare to block all unencrypted traffic to its APIs
News

Cloudflare to block all unencrypted traffic to its APIs

26.03.202517/04/2025HackMag2190
According to Cloudflare, effective immediately, only secure HTTPS connections to api.cloudflare.com will be accepted; while all HTTP ports are to be closed.
CONTINUE READING 🡒
Alexa to stop processing data locally. All voice requests will be sent to Amazon Cloud
News

Alexa to stop processing data locally. All voice requests will…

24.03.2025HackMag1860
Amazon announced that the privacy option allowing users of Echo speakers to avoid sending their voice recordings to the company’s cloud will no longer be supported.
CONTINUE READING 🡒
8,000 vulnerabilities identified in WordPress ecosystem in 2024
News

8,000 vulnerabilities identified in WordPress ecosystem in 2024

20.03.202517/04/2025HackMag3600
According to Patchstack, world’s #1 WordPress vulnerability intelligence provider, 7,966 new vulnerabilities were identified in the WordPress ecosystem in 2024; most of these bugs affected plugins and themes.
CONTINUE READING 🡒
Black Basta ransomware group developed its own automated brute-forcing framework
News

Black Basta ransomware group developed its own automated brute-forcing framework

18.03.202517/04/2025HackMag1930
According to EclecticIQ, Black Basta Ransomware-as-a-Service (RaaS) group has developed its own automated brute-forcing framework dubbed BRUTED. It’s used to hack edge network devices (e.g. firewalls and VPN).
CONTINUE READING 🡒
Researchers force DeepSeek to write malware
News

Researchers force DeepSeek to write malware

16.03.202517/04/2025HackMag1790
According to Tenable, the AI chatbot DeepSeek R1 from China can be used to write malware (e.g. keyloggers and ransomware).
CONTINUE READING 🡒
Mass exploitation of PHP-CGI vulnerability in attacks targeting Japanese companies
News

Mass exploitation of PHP-CGI vulnerability in attacks targeting Japanese companies

12.03.2025HackMag1930
GreyNoise and Cisco Talos experts warn that hackers are actively exploiting CVE-2024-4577, a critical PHP-CGI vulnerability that was discovered and fixed in early June 2024.
CONTINUE READING 🡒
Nearly a million Windows computers impacted by a malvertising campaign
News

Nearly a million Windows computers impacted by a malvertising campaign

10.03.202517/04/2025HackMag1530
According to Microsoft, nearly 1 million Windows devices fell victim to a sophisticated malvertising campaign in recent months. Cybercriminals were able to steal credentials, cryptocurrency, and sensitive information from infected workstations.
CONTINUE READING 🡒
YouTube warns of scam video featuring its CEO
News

YouTube warns of scam video featuring its CEO

07.03.202517/04/2025HackMag2470
According to YouTube, scammers use an AI-generated video of the company’s CEO in phishing attacks to steal user credentials.
CONTINUE READING 🡒
Polish Space Agency disconnects its network due to hacker attack
News

Polish Space Agency disconnects its network due to hacker attack

05.03.2025HackMag1690
Last weekend, the Polish Space Agency (POLSA) had to disconnect all of its systems from the Internet to localize an attack targeting its IT infrastructure.
CONTINUE READING 🡒
Qualcomm extends support for Android devices to 8 years
News

Qualcomm extends support for Android devices to 8 years

28.02.2025HackMag2140
Qualcomm Technologies announced its collaboration with Google with the purpose to provide extended support for OEM devices running on company’s flagship chipsets. This partnership will enable vendors to release software and security updates for their devices for up to eight years.
CONTINUE READING 🡒
More than 100,000 users downloaded SpyLend malware from Google Play Store
News

More than 100,000 users downloaded SpyLend malware from Google Play…

25.02.202517/04/2025HackMag2410
According to Cyfirma, a malicious Android app called SpyLend was available on the official Google Play Store for some time and has been downloaded from there more than 100,000 times. The malware known as SpyLoan (i.e. predatory loan app) was disguised as…
CONTINUE READING 🡒
New JavaScript obfuscation technique uses invisible Unicode characters
News

New JavaScript obfuscation technique uses invisible Unicode characters

23.02.202517/04/2025HackMag2440
According to Juniper Threat Labs , a new JavaScript obfuscation technique that uses invisible Unicode characters was used in a phishing attack targeting Political Action Committee (PAC) affiliates.
CONTINUE READING 🡒
Microsoft fixes vulnerability in Power Pages exploited by cybercriminals
News

Microsoft fixes vulnerability in Power Pages exploited by cybercriminals

21.02.2025HackMag2180
Microsoft patched a severe privilege escalation vulnerability in Power Pages used by hackers as a 0-day.
CONTINUE READING 🡒
Newly-discovered vulnerabilities in OpenSSH open the door to MiTM and DoS attacks
News

Newly-discovered vulnerabilities in OpenSSH open the door to MiTM and…

20.02.202520/02/2025HackMag2080
OpenSSH fixed two vulnerabilities that could result in MiTM and denial of service (DoS) attacks. Interestingly, one of these bugs appeared in the code more than 10 years ago.
CONTINUE READING 🡒
Chrome Enhanced Protection mode is now powered by AI
News

Chrome Enhanced Protection mode is now powered by AI

18.02.202517/04/2025HackMag1950
The Enhanced Protection mode in Google Chrome has been updated. Now it uses AI to protect users from dangerous sites, downloads, and extensions in real time.
CONTINUE READING 🡒
Dutch police seize 127 servers belonging to Zservers hosting provider
News

Dutch police seize 127 servers belonging to Zservers hosting provider

17.02.202517/04/2025HackMag1780
Following the introduction of international sanctions against Zservers, Russian ‘bulletproof’ hosting services provider, the Dutch National Police (Politie) shut down and seized 127 servers belonging to Zservers/XHost.
CONTINUE READING 🡒
12,000 Kerio Control firewalls remain vulnerable to RCE
News

12,000 Kerio Control firewalls remain vulnerable to RCE

14.02.202517/04/2025HackMag2280
Security experts report that more than 12,000 GFI Kerio Control firewall instances remain vulnerable to the critical RCE vulnerability CVE-2024-52875, which was fixed back in December 2024.
CONTINUE READING 🡒
« Previous 1 2 3 … 16 17 18 19 20 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com