HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Coinbase fixes 2FA bug that made customers panic

📟 News

Date: 30/04/2025

Author: HackMag

Cryptocurrency exchange Coinbase has fixed a bug in its Account Activity logs that caused customers to think their credentials were compromised.
Read full article →


FBI Offers 10 million USD for information on Salt Typhoon members

📟 News

Date: 29/04/2025

Author: HackMag

The FBI offers up to 10 million USD for information about members of the Chinese hacker group Salt Typhoon and last year’s attack that had compromised multiple US telecommunications companies.
Read full article →


Asus patches vulnerability in AMI’s MegaRAC enabling attackers to brick servers

📟 News

Date: 25/04/2025

Author: HackMag

Asus released patches for the CVE-2024-54085 vulnerability that allows attackers to seize and disable servers. The security hole affects the American Megatrends International (AMI) MegaRAC Baseboard Management Controller (BMC) software used by many server equipment manufacturers, including Asus, HPE, and ASRock.
Read full article →


Improper authentication control vulnerability affects ASUS routers with AiCloud

📟 News

Date: 23/04/2025

Author: HackMag

ASUSTeK Computer Inc. fixed an improper authentication control vulnerability in routers with AiCloud. The bug allows remote attackers to perform unauthorized actions on vulnerable devices.
Read full article →


Scammers pose as FBI IC3 specialists, offer ‘assistance’ to fraud victims

📟 News

Date: 22/04/2025

Author: HackMag

According to the FBI, scammers impersonating employees of the FBI Internet Fraud Complaint Center (IC3) contact fraud victims offering them ‘assistance’ in getting their money back
Read full article →


Android devices will restart every three days to protect user data

📟 News

Date: 16/04/2025

Author: HackMag

Google introduces a new security feature for Android devices: locked and unused devices will be automatically restarted after three days of inactivity to return their memory to an encrypted state.
Read full article →


Hackers exploit authentication bypass bug in OttoKit WordPress plugin

📟 News

Date: 15/04/2025

Author: HackMag

Hackers exploit an authentication bypass vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin used by more than 100,000 websites. First attacks were recorded just hours after the bug disclosure.
Read full article →


Hackers compromised a bureau within the U.S. Department of the Treasury and spent months in hacked systems

📟 News

Date: 12/04/2025

Author: HackMag

The Office of the Comptroller of the Currency (OCC), an independent bureau within the United States Department of the Treasury, reported a major cybersecurity incident. Unknown attackers had access to sensitive financial watchdog data for more than a year.
Read full article →


April updates released by Microsoft cause issues with Windows Hello

📟 News

Date: 10/04/2025

Author: HackMag

Microsoft warns that some Windows users who have installed the April updates might be unable to login to their Windows services using Windows Hello facial recognition or PIN.
Read full article →


Website of Everest ransomware group hacked and defaced

📟 News

Date: 08/04/2025

Author: HackMag

Last weekend, the darknet website of the Everest ransomware group was hacked and went offline. The attackers replaced its content with a sarcastic message: “Don’t do crime CRIME IS BAD xoxo from Prague.”
Read full article →


Critical RCE vulnerability discovered in Apache Parquet

📟 News

Date: 07/04/2025

Author: HackMag

All versions of Apache Parquet up to and including 1.15.0 are affected by a critical remote code execution (RCE) vulnerability whose CVSS score is 10 out of 10.
Read full article →


Privilege escalation vulnerability in Google Cloud resulting in sensitive data leaks finally patched

📟 News

Date: 04/04/2025

Author: HackMag

Tenable Research revealed details of a recently patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run enabling an attacker to gain access to container images and even inject malicious code into them.
Read full article →


Hackers abuse MU plugins to inject malicious payloads to WordPress

📟 News

Date: 01/04/2025

Author: HackMag

According to Sucuri, hackers store malicious code in the MU-plugins (Must-Use Plugins) directory in WordPress and execute it while remaining undetected.
Read full article →


Zero-day vulnerability in Windows results in NTLM hash leaks

📟 News

Date: 28/03/2025

Author: HackMag

Security experts reported a new zero-day vulnerability in Windows that enables remote attackers to steal NTLM credentials by tricking victims into viewing malicious files in Windows Explorer.
Read full article →


Cloudflare to block all unencrypted traffic to its APIs

📟 News

Date: 26/03/2025

Author: HackMag

According to Cloudflare, effective immediately, only secure HTTPS connections to api.cloudflare.com will be accepted; while all HTTP ports are to be closed.
Read full article →


Alexa to stop processing data locally. All voice requests will be sent to Amazon Cloud

📟 News

Date: 24/03/2025

Author: HackMag

Amazon announced that the privacy option allowing users of Echo speakers to avoid sending their voice recordings to the company’s cloud will no longer be supported.
Read full article →


8,000 vulnerabilities identified in WordPress ecosystem in 2024

📟 News

Date: 20/03/2025

Author: HackMag

According to Patchstack, world’s #1 WordPress vulnerability intelligence provider, 7,966 new vulnerabilities were identified in the WordPress ecosystem in 2024; most of these bugs affected plugins and themes.
Read full article →


Black Basta ransomware group developed its own automated brute-forcing framework

📟 News

Date: 18/03/2025

Author: HackMag

According to EclecticIQ, Black Basta Ransomware-as-a-Service (RaaS) group has developed its own automated brute-forcing framework dubbed BRUTED. It’s used to hack edge network devices (e.g. firewalls and VPN).
Read full article →


Researchers force DeepSeek to write malware

📟 News

Date: 16/03/2025

Author: HackMag

According to Tenable, the AI chatbot DeepSeek R1 from China can be used to write malware (e.g. keyloggers and ransomware).
Read full article →


Mass exploitation of PHP-CGI vulnerability in attacks targeting Japanese companies

📟 News

Date: 12/03/2025

Author: HackMag

GreyNoise and Cisco Talos experts warn that hackers are actively exploiting CVE-2024-4577, a critical PHP-CGI vulnerability that was discovered and fixed in early June 2024.
Read full article →


  • «
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy