• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: News

Microsoft has fixed the most serious ASP.NET vulnerability ever
News

Microsoft has fixed the most serious ASP.NET vulnerability ever

2 weeks ago22/10/2025HackMag9370
Last week, Microsoft fixed an ASP.NET Core vulnerability that scored 9.9 out of 10 on the CVSS scale — the highest severity rating ever for this type of vulnerability.
CONTINUE READING 🡒
GlassWorm worm discovered in OpenVSX and VS Code
News

GlassWorm worm discovered in OpenVSX and VS Code

2 weeks ago24/10/2025HackMag6870
Researchers from Koi Security have observed a large-scale supply chain attack in OpenVSX and the Visual Studio Code Marketplace. Hackers are distributing a self-replicating malware called GlassWorm, which has already been installed about 35,800 times.
CONTINUE READING 🡒
October updates broke USB in Windows Recovery mode
News

October updates broke USB in Windows Recovery mode

2 weeks ago24/10/2025HackMag3630
Microsoft has confirmed that the October security updates disable USB mice and keyboards in the Windows Recovery Environment (WinRE), rendering it unusable.
CONTINUE READING 🡒
Data of 17.6 Million Users Stolen from P2P Lending Platform Prosper
News

Data of 17.6 Million Users Stolen from P2P Lending Platform…

2 weeks ago21/10/2025HackMag4840
Hackers stole the personal data of more than 17.6 million people by breaching the systems of the financial company Prosper. The stolen data included names, addresses, dates of birth, email addresses, Social Security numbers, IDs, and more.
CONTINUE READING 🡒
131 Chrome extensions are spamming WhatsApp
News

131 Chrome extensions are spamming WhatsApp

2 weeks ago21/10/2025HackMag3590
Researchers found 131 extensions in the official Chrome Web Store that automate WhatsApp Web. All of them were used to mass-send spam to Brazilian users.
CONTINUE READING 🡒
AdaptixC2 post-exploitation framework found in a malicious npm package
News

AdaptixC2 post-exploitation framework found in a malicious npm package

2 weeks ago21/10/2025HackMag4210
Kaspersky researchers discovered a malicious npm package, https-proxy-utils. It was disguised as legitimate tools for using proxies in projects and allowed the AdaptixC2 framework—an open-source analogue of the well-known Cobalt Strike—to be installed on compromised developers’ machines.…
CONTINUE READING 🡒
Europol shuts down network of SIM farms serving 49 million fake accounts worldwide
News

Europol shuts down network of SIM farms serving 49 million…

2 weeks ago21/10/2025HackMag3670
European law enforcement carried out Operation SIMCARTEL, during which they dismantled a network of SIM farms whose operators managed 1,200 SIM boxes with 40,000 SIM cards. These phone numbers were used for phishing, investment fraud, extortion, and…
CONTINUE READING 🡒
China Accuses the U.S. of a Cyberattack on the National Time Service
News

China Accuses the U.S. of a Cyberattack on the National…

2 weeks ago21/10/2025HackMag4370
China’s Ministry of State Security has accused the U.S. National Security Agency (NSA) of carrying out cyberattacks on its National Time Service Center (NTSC). It claims that in 2022 the NSA exploited vulnerabilities in the messaging services…
CONTINUE READING 🡒
Google will let you use trusted contacts for account recovery
News

Google will let you use trusted contacts for account recovery

2 weeks ago17/10/2025HackMag4400
A new security feature in Gmail will let users restore access to their accounts with help from friends or family. Trusted Contacts (Recovery Contacts) can be used to receive recovery codes in cases where other methods are…
CONTINUE READING 🡒
North Korean hackers use the EtherHiding tactic to hide malware on the blockchain
News

North Korean hackers use the EtherHiding tactic to hide malware…

3 weeks ago17/10/2025HackMag5140
Analysts from the Google Threat Intelligence Group (GTIG) reported that North Korean hackers have begun using the EtherHiding technique and smart contracts to host and deliver malware.
CONTINUE READING 🡒
October updates for Windows 11 break localhost
News

October updates for Windows 11 break localhost

3 weeks ago17/10/2025HackMag1900
October updates for Windows 11 disrupted localhost functionality, causing applications that connect to 127.0.0.1 over HTTP/2 to potentially not function properly.
CONTINUE READING 🡒
New bug exploited to install rootkits on Cisco devices
News

New bug exploited to install rootkits on Cisco devices

3 weeks ago17/10/2025HackMag6730
Older Cisco network devices that have not been patched against a recently discovered zero-day vulnerability are being infected with a rootkit as part of a new malicious campaign, experts at Trend Micro warn.
CONTINUE READING 🡒
Hackers breach F5: BIG-IP source code and information on undisclosed vulnerabilities stolen
News

Hackers breach F5: BIG-IP source code and information on undisclosed…

3 weeks ago17/10/2025HackMag4250
F5 representatives reported that the company fell victim to an attack by “state-sponsored” hackers who managed to steal confidential information. The attackers maintained access to certain company systems for an extended period, including those related to the…
CONTINUE READING 🡒
Latest Windows 10 updates: Microsoft patches 173 vulnerabilities across its products
News

Latest Windows 10 updates: Microsoft patches 173 vulnerabilities across its…

3 weeks ago16/10/2025HackMag4770
As part of October’s Patch Tuesday, Microsoft released fixes for 173 vulnerabilities across its products, including six 0-days and two vulnerabilities that were already under active attack.
CONTINUE READING 🡒
Researchers eavesdropped on satellite traffic with an $800 device
News

Researchers eavesdropped on satellite traffic with an $800 device

3 weeks ago16/10/2025HackMag4440
Researchers from the University of California, San Diego, and the University of Maryland found that roughly half of geostationary satellite communications are transmitted without any encryption. Over three years of research, the team intercepted confidential data from…
CONTINUE READING 🡒
RMPocalypse Vulnerability Compromises AMD SEV-SNP Security
News

RMPocalypse Vulnerability Compromises AMD SEV-SNP Security

3 weeks ago16/10/2025HackMag5260
AMD has released fixes for the RMPocalypse vulnerability, which can be used to undermine the security of confidential computing provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP) technology.
CONTINUE READING 🡒
Pixnapping attack enables pixel-by-pixel recovery of 2FA codes on Android
News

Pixnapping attack enables pixel-by-pixel recovery of 2FA codes on Android

3 weeks ago16/10/2025HackMag4320
The new Pixnapping side-channel attack allows a malicious Android app to extract sensitive data without any permissions by stealing pixels displayed by other apps or websites.
CONTINUE READING 🡒
200,000 Framework laptops vulnerable to Secure Boot bypass
News

200,000 Framework laptops vulnerable to Secure Boot bypass

3 weeks ago15/10/2025HackMag5280
Approximately 200,000 Linux systems from the American manufacturer Framework were shipped with signed UEFI Shell components that can be used to bypass Secure Boot. Attackers can exploit the issue to load bootkits that circumvent OS-level protections and…
CONTINUE READING 🡒
ChaosBot uses Discord channels to control victims’ computers
News

ChaosBot uses Discord channels to control victims’ computers

3 weeks ago14/10/2025HackMag3810
Infosec specialists at eSentire have discovered a new ChaosBot backdoor written in Rust that allows its operators to conduct reconnaissance and execute arbitrary commands on compromised hosts. The malware is notable for using Discord as its command-and-control…
CONTINUE READING 🡒
Major Botnet Attacks RDP Services in the US
News

Major Botnet Attacks RDP Services in the US

3 weeks ago14/10/2025HackMag3720
A new large-scale botnet has been detected that is attacking Remote Desktop Protocol (RDP) services in the United States, using more than 100,000 IP addresses. Analysts at GreyNoise report that the attacks began on October 8, 2025.
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 … 18 19 20 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com