HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Top-notch cybersecurity magazine

📟 To stay updated, join our Telegram channel: @hack_mag

Contact us

Newly-discovered vulnerabilities in OpenSSH open the door to MiTM and DoS attacks

📟 News

Date: 20/02/2025

Author: HackMag

OpenSSH fixed two vulnerabilities that could result in MiTM and denial of service (DoS) attacks. Interestingly, one of these bugs appeared in the code more than 10 years ago.
Read full article →


Liquid Chrome. ‘Use After Free’ bug in the Blink engine

Date: 19/02/2025

Author: sploitem

In January 2021, Google released a new version of its Chrome browser. In total, 16 vulnerabilities have been fixed in it. Using one of them as an example, let’s find out how such bugs occur and examine their exploitation techniques enabling hackers to attack computers with outdated Chrome versions.
Read full article →


Chrome Enhanced Protection mode is now powered by AI

📟 News

Date: 18/02/2025

Author: HackMag

The Enhanced Protection mode in Google Chrome has been updated. Now it uses AI to protect users from dangerous sites, downloads, and extensions in real time.
Read full article →


Dutch police seize 127 servers belonging to Zservers hosting provider

📟 News

Date: 17/02/2025

Author: HackMag

Following the introduction of international sanctions against Zservers, Russian ‘bulletproof’ hosting services provider, the Dutch National Police (Politie) shut down and seized 127 servers belonging to Zservers/XHost.
Read full article →


Advanced cyberphone. Charge your mobile phone with hacker power!

Date: 16/02/2025

Author: s0i37

In the hands of a hacker, an ordinary Android smartphone can become a formidable weapon – either on its own or in combination with other devices. But hardware is only one component of hacker’s success: to transform a phone into a hacker tool, special software is required.
Read full article →


12,000 Kerio Control firewalls remain vulnerable to RCE

📟 News

Date: 14/02/2025

Author: HackMag

Security experts report that more than 12,000 GFI Kerio Control firewall instances remain vulnerable to the critical RCE vulnerability CVE-2024-52875, which was fixed back in December 2024.
Read full article →


2.8 million IP addresses used to brute-force network devices

📟 News

Date: 12/02/2025

Author: HackMag

The Shadowserver Foundation warns of a massive web login brute-forcing attacks targeting nearly 2.8 million IP addresses per day. Unknown attackers are seeking credentials for a wide range of network devices belonging to such companies as Palo Alto Networks, Ivanti, and SonicWall.
Read full article →


  • «
  • 1
  • …
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • …
  • 82
  • »

HackMag.com © 2025

Privacy Policy | Cookie Policy