• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: News

New version of the XCSSET macOS malware discovered, targeting Xcode developers
News

New version of the XCSSET macOS malware discovered, targeting Xcode…

1 month ago29/09/2025HackMag2080
Microsoft Threat Intelligence researchers have discovered a new variant of the XCSSET malware for macOS. The new version monitors the system clipboard to intercept cryptocurrency transactions and achieves persistence using a new method.
CONTINUE READING 🡒
Hackers attacked tech and legal organizations in the US using the Brickstorm malware
News

Hackers attacked tech and legal organizations in the US using…

1 month ago26/09/2025HackMag2930
Google researchers report that suspected Chinese hackers used the Brickstorm malware in espionage operations targeting U.S. organizations in the technology and legal sectors. The attackers remained hidden in the compromised companies’ networks for about 400 days.
CONTINUE READING 🡒
PyPI users warned again about phishing attacks
News

PyPI users warned again about phishing attacks

1 month ago26/09/2025HackMag3630
The Python Software Foundation team is once again warning developers who use the Python Package Index (PyPI) about a phishing campaign. The attackers are using domain spoofing to harvest credentials.
CONTINUE READING 🡒
Two malicious packages found on Crates.io, the Rust repository
News

Two malicious packages found on Crates.io, the Rust repository

1 month ago26/09/2025HackMag8480
Two malicious packages, totaling about 8,500 downloads, have been discovered in the official Rust repository. The malware scanned developers’ systems to steal private cryptocurrency keys and other secrets.
CONTINUE READING 🡒
A zero-day vulnerability threatens two million Cisco devices, and hackers are already exploiting it
News

A zero-day vulnerability threatens two million Cisco devices, and hackers…

1 month ago26/09/2025HackMag6100
Numerous Cisco devices are vulnerable to an actively exploited zero-day vulnerability (CVE-2025-20352) in IOS and IOS XE. The issue allows attackers to remotely trigger a denial-of-service condition or execute code on vulnerable devices.
CONTINUE READING 🡒
ShadowV2 botnet uses misconfigured Docker containers for DDoS attacks
News

ShadowV2 botnet uses misconfigured Docker containers for DDoS attacks

1 month ago26/09/2025HackMag3270
Darktrace researchers have discovered a new DDoS botnet that infects misconfigured Docker containers and then sells access to customers so they can launch attacks themselves.
CONTINUE READING 🡒
Ransomware operator involved in European airport disruptions arrested
News

Ransomware operator involved in European airport disruptions arrested

1 month ago25/09/2025HackMag3390
The UK National Crime Agency (NCA) has arrested a suspect in a ransomware attack that disrupted operations at European airports earlier this week.
CONTINUE READING 🡒
Kali Linux 2025.3 Released with Ten New Tools
News

Kali Linux 2025.3 Released with Ten New Tools

1 month ago25/09/2025HackMag3940
The developers have released Kali Linux 2025.3 — the third release of this year, featuring 10 new tools, Nexmon support, and improvements to NetHunter.
CONTINUE READING 🡒
Valve advises users who installed BlockBlasters to reinstall their OS
News

Valve advises users who installed BlockBlasters to reinstall their OS

1 month ago25/09/2025HackMag2030
Valve is sending warnings to users who installed and launched the malicious game BlockBlasters, recently discovered on Steam. Affected users are advised to scan their systems with antivirus software and also consider a complete OS reinstallation.
CONTINUE READING 🡒
Unpatched vulnerability in OnePlus devices allows any app to read SMS messages
News

Unpatched vulnerability in OnePlus devices allows any app to read…

1 month ago25/09/2025HackMag2870
Rapid7 specialists discovered a vulnerability in several versions of OxygenOS (the Android-based OS used on OnePlus devices). The bug allows any installed application to access SMS message data and metadata without permissions or user interaction.
CONTINUE READING 🡒
Malicious npm package used QR codes to deliver malware
News

Malicious npm package used QR codes to deliver malware

1 month ago25/09/2025HackMag3190
Researchers have discovered a malicious npm package, fezbox, that steals victims’ cookies. To keep the malicious activity unnoticed, QR codes are used to download the malware from the attackers’ server.
CONTINUE READING 🡒
GitHub Tightens npm Security with Mandatory 2FA and Other Measures
News

GitHub Tightens npm Security with Mandatory 2FA and Other Measures

1 month ago24/09/2025HackMag5520
GitHub developers reported that they are working on a set of protective measures aimed at countering supply chain attacks, which recently led to several major incidents on the platform.
CONTINUE READING 🡒
Researchers have compiled a list of the 25 key MCP vulnerabilities
News

Researchers have compiled a list of the 25 key MCP…

1 month ago24/09/2025HackMag3070
Adversa researchers have published an analysis of the top 25 Model Context Protocol (MCP) vulnerabilities. They describe this list as “the most comprehensive analysis of MCP vulnerabilities to date.”
CONTINUE READING 🡒
Cloudflare Reports 22.2 Tbps DDoS Attack
News

Cloudflare Reports 22.2 Tbps DDoS Attack

1 month ago24/09/2025HackMag3330
Cloudflare reports a new record in the DDoS arena. The company mitigated a DDoS attack that peaked at a record 22.2 Tbps and 10.6 billion packets per second. Just three weeks ago, the company reported mitigating a…
CONTINUE READING 🡒
US Secret Service discovered 100,000 SIM cards that “could have shut down New York’s cellular network”
News

US Secret Service discovered 100,000 SIM cards that “could have…

1 month ago24/09/2025HackMag2450
The U.S. Secret Service reported that in the New York region (the states of New York, New Jersey, and Connecticut), a network of electronic devices was discovered, concentrated around the venue of the UN General Assembly. More…
CONTINUE READING 🡒
Fake password manager apps infect macOS with Atomic Stealer
News

Fake password manager apps infect macOS with Atomic Stealer

1 month ago24/09/2025HackMag3180
LastPass developers warn that attackers are targeting macOS users and impersonating popular products, spreading infostealers via GitHub.
CONTINUE READING 🡒
Customer data stolen from automaker Stellantis
News

Customer data stolen from automaker Stellantis

1 month ago24/09/2025HackMag3870
Stellantis representatives reported that attackers gained access to a third-party service provider’s platform and stole data on North American customers. Apparently, this attack is related to the Salesforce breach.
CONTINUE READING 🡒
Creating real-time video and audio deepfakes starts at $30
News

Creating real-time video and audio deepfakes starts at $30

1 month ago24/09/2025HackMag2330
Experts at Kaspersky Lab discovered darknet ads offering real-time video and audio deepfake creation. The price of such services depends on the complexity and duration of the fake content, starting at $50 for video and $30 for…
CONTINUE READING 🡒
A Steam game stole money from hundreds of people. A streamer raising funds for medical treatment was among the victims.
News

A Steam game stole money from hundreds of people. A…

1 month ago24/09/2025HackMag2270
Another malicious game has been discovered on Steam — BlockBlasters. Attention to the issue was drawn by the case of streamer Raivo Plavnieks, known as RastalandTV. He was trying to raise money for stage-four cancer treatment, but…
CONTINUE READING 🡒
Scammers Are Creating Fake Websites While Impersonating the FBI
News

Scammers Are Creating Fake Websites While Impersonating the FBI

1 month ago22/09/2025HackMag2430
The FBI warned that attackers are spoofing the website of the Internet Crime Complaint Center (IC3) to commit financial fraud or steal visitors’ personal data.
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 7 8 9 10 … 19 20 21 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com