• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up
Salesloft temporarily disables Drift after massive data theft
News

Salesloft temporarily disables Drift after massive data theft

1 week ago05/09/2025HackMag390
Salesloft announced that on September 5 it will temporarily disable its AI chatbot, Drift, after numerous companies were affected by a large-scale supply-chain attack targeting it. The incident resulted in the mass theft of authentication tokens.
CONTINUE READING 🡒
A hacker attack disrupted Bridgestone’s operations
News

A hacker attack disrupted Bridgestone’s operations

1 week ago05/09/2025HackMag280
The Japanese corporation Bridgestone reports that it is investigating a cyberattack that affected the operations of some of its manufacturing facilities in North America.
CONTINUE READING 🡒
Apitor Technology toys transmitted children’s geolocation data to China
News

Apitor Technology toys transmitted children’s geolocation data to China

1 week ago05/09/2025HackMag140
The U.S. Department of Justice filed a lawsuit against toy manufacturer Apitor Technology. U.S. authorities believe the company allowed a third party from China to collect children’s geolocation data without their knowledge and without parental consent.
CONTINUE READING 🡒
How Digital Audio Encoding Works: Sampling, Quantization, Bitrate, and Codecs
Security

How Digital Audio Encoding Works: Sampling, Quantization, Bitrate, and Codecs

1 week ago23/08/2025Mak2k2300
Ever wondered how digital devices play back sound? How a stream of ones and zeros becomes an audible signal? If you’ve started reading, you probably have. In this article, you’ll learn how different audio formats came about,…
CONTINUE READING 🡒
August Windows updates may block app installations
News

August Windows updates may block app installations

1 week ago05/09/2025HackMag290
Microsoft reported that the Windows security updates for August 2025 may trigger unexpected User Account Control (UAC) prompts and cause problems with app installations. The bug affects users without administrator privileges across all supported versions of Windows.
CONTINUE READING 🡒
Hackers Are Using the HexStrike AI Tool to Exploit Newly Disclosed Vulnerabilities
News

Hackers Are Using the HexStrike AI Tool to Exploit Newly…

1 week ago05/09/2025HackMag850
Check Point analysts warned that attackers are using the new HexStrike AI framework, designed for offensive cybersecurity, to exploit recent n-day vulnerabilities in real-world attacks.
CONTINUE READING 🡒
Firewall Level 2: Configuring a MikroTik Router to Block Common Attacks
DevOps

Firewall Level 2: Configuring a MikroTik Router to Block Common…

1 week ago23/08/2025Dmitry Bubnov260
In this article, we’ll cover how to harden a MikroTik router against attacks and port scans, and how to keep your network off blocklists. The techniques you learn here will also help you configure other types of…
CONTINUE READING 🡒
Grok is being used to spread malicious links on X
News

Grok is being used to spread malicious links on X

1 week ago04/09/2025HackMag270
Guardio Labs analysts have observed that attackers are using Grok, the AI assistant integrated into the social network X, to circumvent link-posting restrictions that the platform has implemented to combat malicious advertising.
CONTINUE READING 🡒
Researcher finds a way to hack Chinese Pudu service robots
News

Researcher finds a way to hack Chinese Pudu service robots

1 week ago04/09/2025HackMag320
An independent cybersecurity researcher known as BobDaHacker discovered security issues in Pudu Robotics (a leading global supplier of commercial service robots). The vulnerabilities allowed attackers to redirect the robots to any location and force them to execute…
CONTINUE READING 🡒
Supercharge Nmap: Advanced Penetration Testing with Firewall Evasion, Dirbusting, DoS Simulation, and More
Security

Supercharge Nmap: Advanced Penetration Testing with Firewall Evasion, Dirbusting, DoS…

1 week ago23/08/2025Eugene Zobnin270
Nmap is the gold standard among port scanners and one of a pentester’s most important tools. But can you honestly say you’ve mastered all its features and use cases? In this article, you’ll learn how to use…
CONTINUE READING 🡒
Google patched 120 Android vulnerabilities, including two 0-days
News

Google patched 120 Android vulnerabilities, including two 0-days

1 week ago04/09/2025HackMag1000
Google developers released security updates for Android that fixed 120 vulnerabilities in the operating system. According to the company, two of the issues had already been exploited by attackers in targeted campaigns.
CONTINUE READING 🡒
Hackers abuse the Velociraptor forensics tool
News

Hackers abuse the Velociraptor forensics tool

1 week ago04/09/2025HackMag430
Sophos cybersecurity specialists have highlighted a cyberattack in which unidentified threat actors used the open-source forensic tool for endpoint monitoring Velociraptor.
CONTINUE READING 🡒
Decoding Ping, Traceroute, and WHOIS Output for Effective Network Troubleshooting
Unix

Decoding Ping, Traceroute, and WHOIS Output for Effective Network Troubleshooting

1 week ago23/08/2025Daniil Baturin380
Ping, traceroute, and whois are among the first tools new admins learn. Many people who aren’t network specialists stop there—and that’s a mistake. With the standard toolset you can pull far more information about a problem than…
CONTINUE READING 🡒
Cyberattack disrupts Jaguar Land Rover production
News

Cyberattack disrupts Jaguar Land Rover production

1 week ago03/09/2025HackMag480
Automaker Jaguar Land Rover (JLR) announced that it was forced to take a number of systems offline due to a cyberattack. The incident appears to have affected the automaker’s manufacturing and retail operations.
CONTINUE READING 🡒
Why Smartphone Home Screens Are Broken—and Why I Built AIO Launcher
Mobile

Why Smartphone Home Screens Are Broken—and Why I Built AIO…

1 week ago23/08/2025Eugene Zobnin220
I don’t know about you, but I’ve always found it odd that a powerful smartphone—connecting people to each other and to the rest of the world—uses an utterly useless, uninformative screen of icons as its primary interface.…
CONTINUE READING 🡒
Cloudflare blocked the largest-ever DDoS attack — 11.5 Tbps
News

Cloudflare blocked the largest-ever DDoS attack — 11.5 Tbps

1 week ago03/09/2025HackMag340
The record for DDoS attack power set in June 2025 has already been broken. Cloudflare announced that it recently blocked the largest DDoS attack on record, whose peak bandwidth reached 11.5 Tbps.
CONTINUE READING 🡒
Google Didn’t Ask 2.5 Billion Gmail Users to Change Passwords
News

Google Didn’t Ask 2.5 Billion Gmail Users to Change Passwords

1 week ago03/09/2025HackMag160
Last week, media reports claimed that Google was allegedly notifying all Gmail users (about 2.5 billion people) en masse to urgently change their passwords and enable two-factor authentication. Google representatives say that reports of security issues in…
CONTINUE READING 🡒
Wardriving Hardware Guide: Building a Wi‑Fi Pentesting Toolkit with USB Adapters, Wi‑Fi Pineapple Routers, Antennas, and Other Red Team Tools
Security

Wardriving Hardware Guide: Building a Wi‑Fi Pentesting Toolkit with USB…

1 week ago23/08/2025Oleg Kupreev370
Wardriving—essentially Wi‑Fi traffic capture—always starts with choosing the right hardware. That’s exactly what we’ll do: in a handy Q&A, we’ll break down what devices are out there, which tasks they’re best suited for, and what to pick…
CONTINUE READING 🡒
FreePBX Servers Under Attack Due to a 0-Day Vulnerability
News

FreePBX Servers Under Attack Due to a 0-Day Vulnerability

1 week ago02/09/2025HackMag190
Developers at Sangoma Technologies Corporation have warned about an actively exploited 0-day vulnerability in FreePBX that affects systems with the administration panel exposed to the internet.
CONTINUE READING 🡒
Bug in VS Code allows reuse of deleted extension names
News

Bug in VS Code allows reuse of deleted extension names

2 weeks ago02/09/2025HackMag120
Researchers have discovered an issue in the Visual Studio Code Marketplace that allowed attackers to reuse the names of previously deleted extensions.
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 … 33 34 35 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com