• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: News

Microsoft Disables IE Mode in Edge Due to Abuse by Hackers
News

Microsoft Disables IE Mode in Edge Due to Abuse by…

3 weeks ago14/10/2025HackMag3880
Microsoft developers have overhauled the Internet Explorer (IE) mode in the Edge browser. The reason is that in August 2025 the company received “credible reports” that unknown hackers were abusing the backward compatibility feature to gain unauthorized…
CONTINUE READING 🡒
Malware was distributed via Unity’s official website
News

Malware was distributed via Unity’s official website

3 weeks ago14/10/2025HackMag4060
Unity Technologies, a developer of software for video games, discovered malicious code on its SpeedTree toolkit website that stole confidential data from hundreds of customers.
CONTINUE READING 🡒
Microsoft warns of a hacking group stealing university employees’ paychecks
News

Microsoft warns of a hacking group stealing university employees’ paychecks

3 weeks ago13/10/2025HackMag4600
Microsoft analysts have discovered that since March 2025, the group Storm-2657 has been targeting employees at U.S. universities, taking over accounts and redirecting paychecks to its own accounts.
CONTINUE READING 🡒
Apple is offering up to $2 million for vulnerabilities in its products
News

Apple is offering up to $2 million for vulnerabilities in…

3 weeks ago13/10/2025HackMag4080
Apple has announced a major update and expansion of its bug bounty program. The company is doubling the maximum payouts for bug hunters, adding new categories to the program, and offering up to US$2 million for complex…
CONTINUE READING 🡒
FBI shuts down yet another version of BreachForums
News

FBI shuts down yet another version of BreachForums

3 weeks ago13/10/2025HackMag3640
The FBI has seized yet another BreachForums domain (Breachforums[.]hn) that hackers used for data dumps, listing 39 organizations affected by Salesforce-related data breaches. The threat actors now claim that law enforcement not only took the site offline…
CONTINUE READING 🡒
Velociraptor Forensic Tool Used to Deploy LockBit and Babuk Ransomware
News

Velociraptor Forensic Tool Used to Deploy LockBit and Babuk Ransomware

3 weeks ago13/10/2025HackMag4330
Cisco Talos analysts warn that the Velociraptor tool, designed for digital forensics and incident response, is being used in LockBit and Babuk ransomware attacks.
CONTINUE READING 🡒
Anthropic: As few as 250 malicious documents in the training data can poison an LLM
News

Anthropic: As few as 250 malicious documents in the training…

3 weeks ago13/10/2025HackMag5020
Anthropic specialists, together with the UK government’s AI Safety Institute, the Alan Turing Institute, and other academic institutions, reported that as few as 250 specially crafted malicious documents are enough to make an AI model generate nonsensical…
CONTINUE READING 🡒
Attackers stole firewall configurations for all SonicWall customers who used cloud backups
News

Attackers stole firewall configurations for all SonicWall customers who used…

3 weeks ago10/10/2025HackMag4110
SonicWall has confirmed that the data leak that occurred last month affected all customers who used the company’s cloud backup service. As a result, firewall configurations stored in MySonicWall ended up in the hands of hackers.
CONTINUE READING 🡒
RondoDox Botnet Exploits 56 Vulnerabilities in Its Attacks
News

RondoDox Botnet Exploits 56 Vulnerabilities in Its Attacks

4 weeks ago10/10/2025HackMag5670
A large botnet RondoDox has been discovered that exploits 56 vulnerabilities in more than 30 different devices, including bugs first showcased at the Pwn2Own hacking competition.
CONTINUE READING 🡒
Mic-E-Mouse Attack Turns a Computer Mouse into an Eavesdropping Device
News

Mic-E-Mouse Attack Turns a Computer Mouse into an Eavesdropping Device

4 weeks ago10/10/2025HackMag6010
Researchers from the University of California, Irvine have presented the Mic-E-Mouse attack. The specialists demonstrate that high-DPI optical sensors in modern mice can pick up minute surface vibrations, enabling highly accurate reconstruction of words spoken near the…
CONTINUE READING 🡒
Figma MCP vulnerability allowed remote arbitrary code execution
News

Figma MCP vulnerability allowed remote arbitrary code execution

4 weeks ago10/10/2025HackMag6460
Researchers from Imperva have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp (Model Context Protocol, MCP) server. The issue allowed attackers to remotely execute arbitrary code.
CONTINUE READING 🡒
Google won’t fix the ASCII smuggling issue in the Gemini AI assistant
News

Google won’t fix the ASCII smuggling issue in the Gemini…

4 weeks ago09/10/2025HackMag6540
Google developers have reported that the “ASCII character smuggling” issue in Gemini will not be fixed. Such an attack can be used to trick the AI assistant into providing users with false information, altering the model’s behavior,…
CONTINUE READING 🡒
Clop attacks Oracle E-Business Suite users via a 0-day vulnerability
News

Clop attacks Oracle E-Business Suite users via a 0-day vulnerability

4 weeks ago09/10/2025HackMag4560
Last week, Oracle warned customers about a critical 0-day vulnerability in E-Business Suite (CVE-2025-61882) that allows arbitrary code to be executed remotely without authentication. It has now come to light that the Clop hacking group has been…
CONTINUE READING 🡒
Salesforce says it won’t pay the ransomware hackers who stole 1 billion records
News

Salesforce says it won’t pay the ransomware hackers who stole…

4 weeks ago09/10/2025HackMag4720
Salesforce representatives said they do not intend to negotiate or pay a ransom to the attackers behind a series of large-scale attacks involving the theft of the company’s customer data. The hackers are currently trying to extort…
CONTINUE READING 🡒
In 2025, North Korean hackers stole more than $2 billion
News

In 2025, North Korean hackers stole more than $2 billion

4 weeks ago09/10/2025HackMag4440
According to blockchain analysts at Elliptic, over the first nine months of 2025, North Korean hackers stole more than $2 billion worth of cryptocurrency assets, setting a new record.
CONTINUE READING 🡒
Discord confirms hackers stole government IDs from 70,000 users
News

Discord confirms hackers stole government IDs from 70,000 users

4 weeks ago09/10/2025HackMag4630
Discord has stated that it will not pay a ransom to the attackers who claim to have stolen data on 5.5 million users. The stolen data includes copies of government IDs and partial payment information for some…
CONTINUE READING 🡒
Qualcomm acquires Arduino and announces the UNO Q single-board computer
News

Qualcomm acquires Arduino and announces the UNO Q single-board computer

4 weeks ago08/10/2025HackMag5000
Qualcomm, a company that designs and manufactures chips for mobile phones and other electronics, is acquiring Arduino — the Italian company known for its open-source hardware and software ecosystem. In its statement, Qualcomm emphasizes that Arduino will…
CONTINUE READING 🡒
Fires at South Korean data centers destroyed 858 TB of data and may be linked to North Korea
News

Fires at South Korean data centers destroyed 858 TB of…

4 weeks ago08/10/2025HackMag11910
In late September 2025, South Korea faced one of the largest technological disruptions in its history. Two fires at data centers, occurring within a week, crippled hundreds of government online services, including e-government portals, postal, and tax…
CONTINUE READING 🡒
Hackers blackmail Red Hat, threatening to leak stolen data
News

Hackers blackmail Red Hat, threatening to leak stolen data

4 weeks ago08/10/2025HackMag4890
The Scattered Lapsus$ Hunters group is blackmailing Red Hat. The attackers’ site has posted samples of customer engagement reports stolen from the company, and the hackers claim they demanded a ransom from Red Hat but have not…
CONTINUE READING 🡒
Neon, an app that paid users for call recordings, leaked users’ conversations and shut down
News

Neon, an app that paid users for call recordings, leaked…

4 weeks ago07/10/2025HackMag4700
In late September 2025, the Neon app rose to second place in popularity in the Apple App Store. It paid users for recording their phone calls and sold the data to AI companies. However, a vulnerability was…
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 7 … 18 19 20 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com