Experts from Kaspersky Lab have discovered a new backdoor, GhostContainer, which operates on open-source tools. Researchers believe that the emergence of this malware may be part of a sophisticated targeted campaign aimed at large organizations in Asia,…
CONTINUE READING 🡒 Proxy Trickster Group Attacks Nearly 900 Servers in 58 Countries…
Experts from Solar 4RAYS of the “Solar” Group discovered a new hacking group called Proxy Trickster, which engages in cryptocurrency mining and proxyjacking (hijacking control over servers for transformation and sale). Over the course of a year,…
CONTINUE READING 🡒 Analyzing Attacks on Microsoft Active Directory: Intrusion Techniques and Detection…
Over the past four years, not a single Black Hat or DEF CON has gone by without presentations focusing on attacks against Microsoft Active Directory. Participants share new attack vectors and their own innovations, while also providing…
CONTINUE READING 🡒 Scammers Discover Method to Bypass FIDO Multi-Factor Authentication
Operators of the phishing campaign PoisonSeed have found a method to bypass FIDO (in this case — FIDO2 with WebAuthn) by exploiting the authentication mechanism between devices implemented in WebAuthn. The attackers deceive victims into approving login…
CONTINUE READING 🡒 HPE Aruba Instant On Access Points Contained Hardcoded Credentials
Hewlett-Packard Enterprise (HPE) has warned that hardcoded credentials have been discovered in Aruba Instant On access points. These credentials allow bypassing standard device authentication to gain access to the web interface.
CONTINUE READING 🡒 Critical Bug in CrushFTP Allows for Administrative Access
The developers of CrushFTP warn about a zero-day vulnerability (CVE-2025-54309), which hackers are already exploiting. This issue allows for administrative access to vulnerable servers through the web interface.
CONTINUE READING 🡒 Trojan Chaos RAT Discovered in Arch User Repository
Developers of Arch Linux discovered three malicious packages in the Arch User Repository (AUR). These packages were used to install the Chaos remote access trojan (RAT) on Linux devices.
CONTINUE READING 🡒 Microsoft Releases Emergency Patch: 0-Day Vulnerabilities in SharePoint Exploited in…
Critical zero-day vulnerabilities in Microsoft SharePoint (CVE-2025-53770 and CVE-2025-53771) have been actively exploited since the end of last week, compromising at least 85 servers worldwide.
CONTINUE READING 🡒 Introduction to Hacking: Authentication Testing and Basic Security Exploits
Fifteen years ago, Chris Kaspersky's epic work "Fundamental Principles of Hacking" was the go-to guide for every budding computer security researcher. The editors of "Hacker" have taken on the challenge of updating this substantial work, bringing it…
CONTINUE READING 🡒 Google Sues Operators of BadBox 2.0 Botnet Infecting Over 10…
Google has filed a lawsuit against the anonymous operators of the Android botnet BadBox 2.0, accusing them of orchestrating a global fraud scheme targeting the company’s advertising platforms.
CONTINUE READING 🡒 Malware LameHug Utilizes LLM to Generate Commands on Infected Machines
The new malware family LameHug utilizes LLM (Large Language Model) to generate commands that are executed on compromised systems running Windows.
CONTINUE READING 🡒 Malware Hidden Inside DNS Records
Experts at DomainTools discovered that hackers are hiding malicious payloads within DNS records. This simplifies the retrieval of malware binaries, as it eliminates the need to download them from suspicious sites or attach them to emails.
CONTINUE READING 🡒 Advanced OSINT Techniques: Exploring Modern Network Intelligence Methods
What do competitive intelligence, penetration testing, and cyber incident investigations have in common? They all involve information gathering, primarily from open sources. But what do you do when the data you find isn't enough, and your usual…
CONTINUE READING 🡒 Curl Developer Considers Ending Bug Bounties Due to AI-Generated Junk
The founder and lead developer of Curl, Daniel Stenberg, announced that due to an abundance of AI-generated junk, he is prepared to completely terminate the project’s bug bounty program. The issue is that he and other maintainers…
CONTINUE READING 🡒 Chrome Addresses Sandbox Escape Vulnerability Already Exploited in Attacks
Google has released fixes for six vulnerabilities in the Chrome browser. One of these vulnerabilities was already being exploited in real attacks to bypass the browser’s sandbox.
CONTINUE READING 🡒 APK Files of Konfety Malware Obfuscated to Evade Detection
Experts have discovered a new variant of the Android malware Konfety with a distorted ZIP structure and other obfuscation techniques that allow it to evade analysis and detection.
CONTINUE READING 🡒 Mastering the Terminal: Essential Tips to Become a Console Guru
Any Unix enthusiast who has spent a couple of hours learning basic commands and bash syntax knows that the command line is an incredibly handy tool. However, not everyone realizes just how powerful the console can actually…
CONTINUE READING 🡒 Programming Microcontrollers with Python: High-Level Language for Single-Board Computers
There's a joke that after a long day at the computer, a typical programmer goes home, sits down at the PC, and unwinds in the same way. The truth is even more daunting: many of us, after…
CONTINUE READING 🡒 Understanding and Hacking BitLocker: Exploring Windows Disk Encryption and Its…
The BitLocker encryption technology was first introduced ten years ago and has evolved with each new version of Windows. However, not all changes have been aimed at increasing cryptographic strength. In this article, we will take an…
CONTINUE READING 🡒 Run a Full Ubuntu Desktop on Windows 10 with Linux…
It's been over six months since the author wrote the previous article about Windows Subsystem for Linux. During this time, Microsoft released its first major update for Windows 10—the Anniversary Update 1607. With this update, all new…
CONTINUE READING 🡒