HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Zyxel firewalls reboot due to flawed update

📟 News

Date: 27/01/2025

Author: HackMag

Zyxel warned its customers that a recent signature update may cause critical errors in USG FLEX and ATP series firewalls. As a result, devices go into infinite reboot loops.
Read full article →

Cisco patched a critical vulnerability in Meeting Management

📟 News

Date: 26/01/2025

Author: HackMag

Cisco released updates to fix a critical (CVSS score: 9.9) vulnerability in Meeting Management. The bug enables an unprivileged remote authenticated attacker to gain administrative privileges.
Read full article →

18,000 script kiddies have been infected with backdoor via XWorm RAT builder

📟 News

Date: 25/01/2025

Author: HackMag

According to CloudSEK analysts, malefactors attack novice hackers using a fake malware builder. Script kiddies’ systems become infected with a backdoor that steals data and subsequently seizes control over their computers.
Read full article →

Hundreds of websites impersonating Reddit and WeTransfer spread Lumma Stealer

📟 News

Date: 24/01/2025

Author: HackMag

Sekoia researcher crep1x discovered that hackers are currently using some 1,000 pages impersonating Reddit and WeTransfer. Victims visiting these sites are tricked into downloading the Lumma Stealer malware.
Read full article →

Fake Telegram CAPTCHA forces users to run malicious PowerShell scripts

📟 News

Date: 23/01/2025

Author: HackMag

Hackers used the news of Ross Ulbricht pardoning to lure users to a rogue Telegram channel where they are tricked into running malicious PowerShell code.
Read full article →

Fake Homebrew Infects macOS and Linux Machines with infostealer

📟 News

Date: 22/01/2025

Author: HackMag

Attackers use Google ads to disguise themselves as the Homebrew website and distribute malware targeting Mac and Linux systems and stealing logon credentials, browser data, and cryptocurrency wallets.
Read full article →

  • «
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

HackMag.com © 2025

Privacy Policy | Cookie Policy