The maintainers of the Python Package Index (PyPI) have issued a warning about a phishing campaign targeting users. Attackers aim to redirect victims to fake websites disguised as PyPI with the intent to steal credentials.
CONTINUE READING 🡒 Tea App Suffered a Data Leak Exposing Users’ Personal Information…
The Tea platform suffered from two major data leaks. First, an unprotected Firebase database containing users’ personal information was discovered on 4chan, and then a second database was found containing 1.1 million personal messages exchanged by users.
CONTINUE READING 🡒 Creating and Enhancing Your Own Python Port Scanner
Where does a server attack begin? That's right, with reconnaissance! There are many port scanners available, and they perform their tasks quickly and effectively. However, a true hacker should understand how their favorite tools work, so today,…
CONTINUE READING 🡒 Popular npm Packages Hacked to Distribute Malware
In recent weeks, a number of open-source developers have fallen victim to phishing attacks. As a result, malware infiltrated packages, some of which receive 30 million downloads per week.
CONTINUE READING 🡒 Malware Discovered in Official Endgame Gear Mouse Software
The gaming peripherals manufacturer Endgame Gear has reported that malware was embedded in the tool for configuring the OP1w 4k v2 mouse on the company’s official website from June 26 to July 9, 2025.
CONTINUE READING 🡒 Create Your Own Game Cheats: Developing a Trainer in C++
Everyone loves playing games, but it's much more exciting when you have an endless supply of ammo and health. To get both, you can search online for cheats and trainers for your favorite game. But what if…
CONTINUE READING 🡒 Microsoft Reveals Sploitlight Vulnerability Affecting macOS
Microsoft has reported that attackers could have exploited a recently patched vulnerability bypassing Transparency, Consent, and Control (TCC) to steal confidential information from macOS users, including cached Apple Intelligence data.
CONTINUE READING 🡒 Building a Simple Trojan with Python: A Step-by-Step Guide
In this article, I will explain how to create a basic remote access Trojan using Python, and for added stealth, we'll embed it within a game. Even if you're not familiar with Python, this will help you…
CONTINUE READING 🡒 Due to a Bug in Post SMTP Plugin, 200,000 WordPress…
More than 200,000 WordPress sites are using a vulnerable version of the Post SMTP plugin, which allows attackers to gain control over the administrator account.
CONTINUE READING 🡒 Self-defense for hackers. Monitoring attacks on the airwaves
This article explains how to detect intrusions into your wireless network. Almost all mainstream attacks on Wi-Fi have distinctive features, and you can identify them by listening to the airwaves.
CONTINUE READING 🡒 No Patch for RCE Vulnerability in LG Surveillance Cameras
LG surveillance cameras are vulnerable to remote attacks due to a recently discovered vulnerability. However, it has become known that they will not receive patches.
CONTINUE READING 🡒 Mastering systemd: Creating Your Own Linux Service
Despite numerous issues and mixed feelings from users, systemd has become the de facto standard in most Linux distributions. It allows you to create a simple service in just a few minutes and a handful of configuration…
CONTINUE READING 🡒 Gathering User Data in Windows Networks: Exploring Active Directory Without…
Imagine someone launching an attack on a corporate Windows network. Initially, the attacker has either limited or no privileges within the domain. Consequently, they will search for accounts and services without elevated privileges, meaning they won't be…
CONTINUE READING 🡒 Introduction to Assembly Language: Beginner’s Guide to Getting Started
You've decided to learn assembly language but don't know where to start or what tools you need? Let me guide you through it using a "Hello, World!" program as an example. Along the way, I'll also explain…
CONTINUE READING 🡒 Collecting Credentials in Active Directory: Identifying Critical Data Amid Domain…
For a successful attack on Active Directory, taking control of workstations, and moving laterally across a network, a skilled hacker doesn't necessarily need user credentials. However, there are times when they are indispensable. To obtain these credentials,…
CONTINUE READING 🡒 How to Fix a USB Drive That Has Turned Into…
Imagine you insert a USB drive into your computer and see a message: "To use the disk in drive F:, you must first format it. Do you want to format it?" If it's a new USB drive,…
CONTINUE READING 🡒 Operator of Pirate Streaming Service Jetflix Sentenced to 7 Years…
The founder of the pirate streaming service Jetflicks, Kristopher Dallmann, has been sentenced to seven years in prison. Dallmann did not plead guilty to several charges, including conspiracy, copyright infringement, and money laundering.
CONTINUE READING 🡒 Ransomware Code Generated by FunkSec AI
Experts from Kaspersky Lab have studied the activity of the FunkSec group, which emerged in late 2024. The main features of the group turned out to be: the use of AI-based tools (including in the development of…
CONTINUE READING 🡒 Amazon Denies Possible Data Breach of Ring Camera Users
Users of Ring are observing multiple notifications about account logins from unauthorized devices, dated May 28, 2025. Ring developers claim that this is due to an error during a backend update.
CONTINUE READING 🡒 Assembly Programming for Beginners
We've been developing this idea for a long time, probably for several years. On one hand, assembler programming is fascinating. On the other hand, there are plenty of up-to-date resources on assembly language, including publications from this…
CONTINUE READING 🡒