• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up
Top 5 Web-Based Emulators for Classic Operating Systems and Retro Computers
Stuff

Top 5 Web-Based Emulators for Classic Operating Systems and Retro…

1 week ago06/10/2025apismenny1640
Modern computers and browsers have reached impressive performance levels. Ten years ago, an interactive web app felt like a marvel; now JavaScript powers not just games, but even full-fledged emulators of vintage computers. We’ve picked a few…
CONTINUE READING 🡒
The Crimson Collective hacking group claims to have stolen 570 GB of data from Red Hat.
News

The Crimson Collective hacking group claims to have stolen 570…

1 week ago02/10/2025HackMag2170
The ransomware group Crimson Collective has claimed to have stolen 570 GB of data from 28,000 internal Red Hat repositories. Company representatives confirmed that one of its GitLab instances was breached.
CONTINUE READING 🡒
Hackers Are Sending SMS via Vulnerable Milesight Industrial Routers
News

Hackers Are Sending SMS via Vulnerable Milesight Industrial Routers

1 week ago02/10/2025HackMag1130
Fraudsters are exploiting unsecured Milesight industrial routers to send out phishing SMS messages. Sekoia specialists discovered that such campaigns have been ongoing since 2023.
CONTINUE READING 🡒
Internet access in Afghanistan is starting to be restored
News

Internet access in Afghanistan is starting to be restored

1 week ago02/10/2025HackMag1460
Analysts from the international organization NetBlocks reported that after two days of a complete shutdown, internet connections in Afghanistan have begun to be restored. Meanwhile, the country’s authorities stated that the outages were caused by aging fiber-optic…
CONTINUE READING 🡒
Automating x64dbg. How to transform a debugger into a hacker machine
Coding

Automating x64dbg. How to transform a debugger into a hacker…

1 week agomr.grogrig1890
Why automate x64dbg? Because an automated debugger enables you to create custom tools for standard debugging tasks: unpack files, search for signatures, intercept or substitute function outputs on the fly, and even perform fuzzing in RAM! Let’s see how this can be done.
CONTINUE READING 🡒
3 Reasons to Skip the Latest Android Updates
Mobile

3 Reasons to Skip the Latest Android Updates

1 week ago13/09/2025Eugene Zobnin1020
For power users and app developers, Android has long been a very comfortable platform. Open-source code, rich capabilities, and the absence of heavy-handed control from Google made an Android smartphone a true pocket computer. But times change,…
CONTINUE READING 🡒
New Android banking trojan Klopatra uses VNC to control infected smartphones
News

New Android banking trojan Klopatra uses VNC to control infected…

1 week ago02/10/2025HackMag1480
An Android banking trojan and RAT called Klopatra masquerades as an IPTV and VPN app and has already infected more than 3,000 devices. The malware is a trojan capable of monitoring the device’s screen in real time,…
CONTINUE READING 🡒
AI to detect ransomware in Google Drive
News

AI to detect ransomware in Google Drive

1 week ago02/10/2025HackMag820
Google has introduced a new AI tool designed for Drive for desktop. The model is said to be trained on millions of real ransomware samples and can pause syncing to reduce the damage from a ransomware attack.
CONTINUE READING 🡒
Hiding Sensitive Data in Android Apps: Techniques for Storing and Obfuscating Secrets
Mobile

Hiding Sensitive Data in Android Apps: Techniques for Storing and…

1 week ago13/09/2025Eugene Zobnin1590
At some point, almost every developer has had to hide data inside an app. This could be encryption keys used to decrypt parts of the program, API endpoint URLs, or strings you’d rather conceal to make a…
CONTINUE READING 🡒
Tile Trackers Transmit Data in Plaintext
News

Tile Trackers Transmit Data in Plaintext

1 week ago01/10/2025HackMag940
A group of researchers from the Georgia Institute of Technology claims that Tile Bluetooth trackers transmit identifying data in plaintext. This makes it easy to identify and track their owners.
CONTINUE READING 🡒
MatrixPDF Turns PDF Files into Phishing Lures
News

MatrixPDF Turns PDF Files into Phishing Lures

1 week ago01/10/2025HackMag1290
A new phishing toolkit, MatrixPDF, has been discovered that allows attackers to turn ordinary PDF files into interactive lures that bypass email security and redirect victims to sites for credential theft or malware downloads.
CONTINUE READING 🡒
How to Reduce Mobile Data Usage on Android: Practical Tips and Settings
Mobile

How to Reduce Mobile Data Usage on Android: Practical Tips…

1 week ago13/09/2025Denis Pogrebnoy1690
Cellular networks are delivering ever-faster Internet access, and mobile devices keep consuming more data. But mobile Internet is still far from cheap: plenty of users are still on plans capped at 4 GB, and when you travel,…
CONTINUE READING 🡒
Critical sudo vulnerability is under active exploitation
News

Critical sudo vulnerability is under active exploitation

1 week ago01/10/2025HackMag1790
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that hackers are actively exploiting a critical vulnerability (CVE-2025-32463) in the sudo utility, which allows commands to be executed on Linux with root-level privileges.
CONTINUE READING 🡒
Internet Completely Shut Down Across Afghanistan
News

Internet Completely Shut Down Across Afghanistan

1 week ago01/10/2025HackMag1110
According to specialists from NetBlocks and Cloudflare, on September 29, 2025, a complete internet shutdown was imposed in Afghanistan. Analysts reported that internet service providers in the country were disconnected in stages, and telephone service is also…
CONTINUE READING 🡒
Is Google Building an Android Successor?
Mobile

Is Google Building an Android Successor?

1 week ago13/09/2025Eugene Zobnin1490
In April of last year, without any fanfare, Google quietly published the source code for a new OS called Fuchsia, written in Dart. Because Fuchsia was built on a tiny microkernel, the knee‑jerk reaction from journalists and…
CONTINUE READING 🡒
Japan’s largest brewer halted operations after a hacker attack
News

Japan’s largest brewer halted operations after a hacker attack

1 week ago30/09/2025HackMag1130
Asahi Group Holdings (hereinafter, Asahi), the producer of Japan’s best-selling beer, suffered a cyberattack that disrupted operations at multiple production sites. The incident affected order intake and delivery processes, which had to be suspended. The call center…
CONTINUE READING 🡒
Brave to add Ask Brave AI search feature
News

Brave to add Ask Brave AI search feature

1 week ago30/09/2025HackMag980
The developers at Brave Software, the company behind the privacy-focused browser and search engine, have introduced the Ask Brave feature, which combines search and an AI chat into a single interface.
CONTINUE READING 🡒
F-Droid developers criticize Android’s restrictions on sideloading third-party apps
News

F-Droid developers criticize Android’s restrictions on sideloading third-party apps

1 week ago30/09/2025HackMag2000
Recently, Google announced that starting in 2026, only apps from verified developers will be installable on certified Android devices. Representatives of F-Droid say that if developers operating outside the Google Play store are required to undergo verification,…
CONTINUE READING 🡒
Why End-to-End Encryption in Signal, WhatsApp, Telegram, and Viber Won’t Protect Your Messages from Device Hacks
Mobile

Why End-to-End Encryption in Signal, WhatsApp, Telegram, and Viber Won’t…

1 week ago13/09/202584ckf1r31430
Encryption in messaging apps became popular because it happens entirely behind the scenes. Users don’t have to generate key pairs, sign them, or revoke old and compromised keys on their own—everything is handled automatically, and the conversation…
CONTINUE READING 🡒
UK government to allocate £1.5 billion to Jaguar Land Rover due to cyberattack
News

UK government to allocate £1.5 billion to Jaguar Land Rover…

1 week ago30/09/2025HackMag940
The UK government will provide Jaguar Land Rover with a government-backed loan of £1.5 billion ($2 billion) to restore its supply chain after a large-scale cyberattack that forced the automaker to halt production.
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 … 40 41 42 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com