HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Top-notch cybersecurity magazine

📟 To stay updated, join our Telegram channel: @hack_mag

Contact us

Threadless Injection. Injecting shellcode into third-party processes to circumvent EDR

Date: 07/05/2025

Author: Nik Zerof

This article discusses Threadless Injection: a technique making it possible to make injections into third-party processes. At the time of writing, it effectively worked on Windows 11 23H2 x64 running on a virtual machine isolated from the network with OS security features enabled.
Read full article →


Malicious Python packages exploit Gmail and WebSockets

📟 News

Date: 06/05/2025

Author: HackMag

Socket’s Threat Research Team discovered seven malicious Python packages that use Gmail SMTP servers and WebSockets for data exfiltration and remote command execution.
Read full article →


Kali Ashes: Hardening hacker distribution and mastering silent pentesting techniques

Date: 05/05/2025

Author: Caster

Kali Linux is extremely popular among pentesters. However, if you penetrate into a network using default settings of this distribution, it would create much noise on the air, which won’t go unnoticed. This article discusses Kali hardening and explains how to make Linux as silent as possible.
Read full article →


Coinbase fixes 2FA bug that made customers panic

📟 News

Date: 30/04/2025

Author: HackMag

Cryptocurrency exchange Coinbase has fixed a bug in its Account Activity logs that caused customers to think their credentials were compromised.
Read full article →


FBI Offers 10 million USD for information on Salt Typhoon members

📟 News

Date: 29/04/2025

Author: HackMag

The FBI offers up to 10 million USD for information about members of the Chinese hacker group Salt Typhoon and last year’s attack that had compromised multiple US telecommunications companies.
Read full article →


Process Ghosting. Circumvent antiviruses in the most dangerous way

Date: 28/04/2025

Author: Nik Zerof

One of the main priorities for hackers is to hide the execution of their malicious code. This article explains how to start processes using the Process Ghosting technique and discusses operation principles of malware detection systems.
Read full article →


Asus patches vulnerability in AMI’s MegaRAC enabling attackers to brick servers

📟 News

Date: 25/04/2025

Author: HackMag

Asus released patches for the CVE-2024-54085 vulnerability that allows attackers to seize and disable servers. The security hole affects the American Megatrends International (AMI) MegaRAC Baseboard Management Controller (BMC) software used by many server equipment manufacturers, including Asus, HPE, and ASRock.
Read full article →


  • «
  • 1
  • …
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • …
  • 82
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy