HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Gigabyte Motherboards Vulnerable to UEFI Malware

📟 News

Date: 18/07/2025

Author: HackMag

Many models of Gigabyte motherboards utilize vulnerable UEFI firmware, which allows for the installation of bootkits that are invisible to the operating system.

Read full article →


Hackers Exploit Critical RCE Vulnerability in Wing FTP Server

📟 News

Date: 17/07/2025

Author: HackMag

Hackers began exploiting a critical vulnerability in Wing FTP Server just one day after technical details about the issue were published.

Read full article →


eSIM Vulnerabilities Allow Card Cloning and User Spying

📟 News

Date: 17/07/2025

Author: HackMag

AG Security Research researchers have discovered vulnerabilities in the eSIM technology used in modern smartphones. The issues impact the eUICC software package by Kigen, which is used by billions of devices.

Read full article →


FBI Shuts Down Websites Distributing Pirated Games

📟 News

Date: 17/07/2025

Author: HackMag

The Federal Bureau of Investigation (FBI) seized the domain names of several websites associated with pirated games. Notably, NSW2U[.]com, which Nintendo has been battling for many years, was shut down.

Read full article →


Google Gemini May Direct Users to Phishing Sites

📟 News

Date: 17/07/2025

Author: HackMag

Google Gemini for Workspace can be used to create brief email summaries that appear legitimate but contain malicious instructions and messages directing users to phishing sites.

Read full article →


GPUHammer: Rowhammer Attack Adapted for Nvidia Graphics Cards

📟 News

Date: 17/07/2025

Author: HackMag

Nvidia recommends users activate System Level Error-Correcting Code (ECC), as graphics cards with GDDR6 memory are vulnerable to the Rowhammer attack.

Read full article →


WordPress Plugin Developer for Gravity Forms Hacked, Backdoor Installed

📟 News

Date: 17/07/2025

Author: HackMag

The popular WordPress plugin Gravity Forms suffered from a supply chain attack. As a result, installers from the official website were infected with a backdoor.

Read full article →


Bluetooth vulnerabilities can be used for eavesdropping and data theft

📟 News

Date: 30/06/2025

Author: HackMag

Airoha Bluetooth chipsets installed in dozens of audio devices from various manufacturers can be used for eavesdropping and theft of sensitive data.
Read full article →


More than 60 malicious NPM packages are stealing user data

📟 News

Date: 29/05/2025

Author: HackMag

Socket’s Threat Research Team discovered an active campaign involving dozens of malicious npm packages that collect and leak information from victims’ systems.
Read full article →


MathWorks affected by ransomware attack

📟 News

Date: 28/05/2025

Author: HackMag

MathWorks, Inc., an American corporation specializing in mathematical computing software, was affected by a ransomware attack resulting in service interruptions.
Read full article →


Packages intentionally destroying data discovered in NPM

📟 News

Date: 26/05/2025

Author: HackMag

Socket experts discovered in npm (node package manager) eight malicious packages that were downloaded from the repository more than 6,200 times over the last two years. All these packages could destroy data on users’ workstations.
Read full article →


Chrome will change compromised user passwords automatically

📟 News

Date: 23/05/2025

Author: HackMag

Google developers announced a new feature in the Chrome browser enabling its built-in password manager to change compromised credentials automatically.
Read full article →


Chinese hackers use zero-day vulnerability in Trimble Cityworks to attack US Government networks

📟 News

Date: 23/05/2025

Author: HackMag

According to Cisco Talos, Chinese-speaking threat actors used a zero-day vulnerability in the Trimble Cityworks software to attack local governing bodies across the United States.
Read full article →


More than 100 dual-function Chrome extensions hijack sessions and steal user credentials

📟 News

Date: 22/05/2025

Author: HackMag

According to DomainTools Intelligence (DTI), more than 100 malicious Chrome browser extensions disguised as VPN services, AI assistants, crypto utilities, etc. are used to steal cookies and covertly execute remote scripts.
Read full article →


Defendnot utility disables Microsoft Defender in Windows

📟 News

Date: 20/05/2025

Author: HackMag

A new tool called Defendnot can disable Microsoft Defender protection on Windows devices even if no real antiviruses are installed in the system.
Read full article →


Malware contained in NPM hides itself using Unicode-based steganography

📟 News

Date: 19/05/2025

Author: HackMag

A malicious package discovered in npm (node package manager) hides its code using invisible Unicode characters and uses Google Calendar links for communication with its C&C servers.
Read full article →


Customer support agents of Coinbase cryptocurrency exchange sold stolen user data to hackers

📟 News

Date: 16/05/2025

Author: HackMag

Coinbase, Inc., a cryptocurrency exchange with over 100 million users, announced that some rogue customer support agents sold customer data to cybercriminals. The extortionists demanded a 20 million USD ransom for nondisclosure of the stolen information.
Read full article →


Chrome employs AI to stop scammers

📟 News

Date: 14/05/2025

Author: HackMag

Google introduces a new security feature to Chrome. The new protection system uses the on-device Gemini Nano large language model (LLM) to detect and block scams while users are browsing the web.
Read full article →


OttoKit WordPress plugin targeted by massive attacks

📟 News

Date: 13/05/2025

Author: HackMag

Hackers exploit a critical privilege escalation vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin to create new admin accounts on vulnerable sites.
Read full article →


Malicious Python packages exploit Gmail and WebSockets

📟 News

Date: 06/05/2025

Author: HackMag

Socket’s Threat Research Team discovered seven malicious Python packages that use Gmail SMTP servers and WebSockets for data exfiltration and remote command execution.
Read full article →


  • «
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy