• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up
ShadowV2 botnet uses misconfigured Docker containers for DDoS attacks
News

ShadowV2 botnet uses misconfigured Docker containers for DDoS attacks

2 weeks ago26/09/2025HackMag2610
Darktrace researchers have discovered a new DDoS botnet that infects misconfigured Docker containers and then sells access to customers so they can launch attacks themselves.
CONTINUE READING 🡒
Design and Implement a Custom TCP Protocol and C# Server from Scratch
Stuff

Design and Implement a Custom TCP Protocol and C# Server…

2 weeks ago13/09/20250x25CBFC4F1170
You’ve dealt with plenty of protocols over the years—some you’ve used, others you may have reverse‑engineered. Some were easy to read; others were indecipherable without a hex editor. In this article, I’ll show you how to design…
CONTINUE READING 🡒
Ransomware operator involved in European airport disruptions arrested
News

Ransomware operator involved in European airport disruptions arrested

2 weeks ago25/09/2025HackMag2730
The UK National Crime Agency (NCA) has arrested a suspect in a ransomware attack that disrupted operations at European airports earlier this week.
CONTINUE READING 🡒
Kali Linux 2025.3 Released with Ten New Tools
News

Kali Linux 2025.3 Released with Ten New Tools

2 weeks ago25/09/2025HackMag2720
The developers have released Kali Linux 2025.3 — the third release of this year, featuring 10 new tools, Nexmon support, and improvements to NetHunter.
CONTINUE READING 🡒
Valve advises users who installed BlockBlasters to reinstall their OS
News

Valve advises users who installed BlockBlasters to reinstall their OS

2 weeks ago25/09/2025HackMag1430
Valve is sending warnings to users who installed and launched the malicious game BlockBlasters, recently discovered on Steam. Affected users are advised to scan their systems with antivirus software and also consider a complete OS reinstallation.
CONTINUE READING 🡒
An ‘Easter Egg’ in Telegram. How to log in without cloud passwords and notifications
Security

An ‘Easter Egg’ in Telegram. How to log in without…

2 weeks agoAnton Shustikov2330
Telegram developers are continuously improving their product: the messenger gets more and more functions every year. But some of its cool features can turn, as of a sudden, into nasty bugs. This article discusses a curious vulnerability discovered when I was investigating…
CONTINUE READING 🡒
How Keyloggers Evade Antivirus: A C# Proof of Concept
Stuff

How Keyloggers Evade Antivirus: A C# Proof of Concept

2 weeks ago13/09/2025Hackat and Mikhail Artyukhin1190
Full-fledged keyloggers packed with features and anti-detection measures can cost dozens, if not hundreds, of dollars. But a keylogger isn’t that complex, and if you want, you can build your own and even evade antivirus detection. In…
CONTINUE READING 🡒
The Great Password Collider: Recovering Passwords from Hashes Without Heavy Computation
Security

The Great Password Collider: Recovering Passwords from Hashes Without Heavy…

2 weeks ago13/09/202584ckf1r31850
It’s often necessary to recover a password when all you have is its hash. You could brute-force it on your own machine, but it’s much faster to leverage existing databases. Even public datasets contain tens of millions…
CONTINUE READING 🡒
Unpatched vulnerability in OnePlus devices allows any app to read SMS messages
News

Unpatched vulnerability in OnePlus devices allows any app to read…

2 weeks ago25/09/2025HackMag1810
Rapid7 specialists discovered a vulnerability in several versions of OxygenOS (the Android-based OS used on OnePlus devices). The bug allows any installed application to access SMS message data and metadata without permissions or user interaction.
CONTINUE READING 🡒
Malicious npm package used QR codes to deliver malware
News

Malicious npm package used QR codes to deliver malware

2 weeks ago25/09/2025HackMag2550
Researchers have discovered a malicious npm package, fezbox, that steals victims’ cookies. To keep the malicious activity unnoticed, QR codes are used to download the malware from the attackers’ server.
CONTINUE READING 🡒
Speech-to-Speech: Building an AI Voice Cloning Neural Network
Security

Speech-to-Speech: Building an AI Voice Cloning Neural Network

2 weeks ago13/09/2025Mikhail Kireev2010
There are more and more ways to identify someone by their voice. At the same time, researchers are finding ways to bypass these mechanisms—both to protect personal data and to break into systems that rely on them.…
CONTINUE READING 🡒
GitHub Tightens npm Security with Mandatory 2FA and Other Measures
News

GitHub Tightens npm Security with Mandatory 2FA and Other Measures

2 weeks ago24/09/2025HackMag3380
GitHub developers reported that they are working on a set of protective measures aimed at countering supply chain attacks, which recently led to several major incidents on the platform.
CONTINUE READING 🡒
Researchers have compiled a list of the 25 key MCP vulnerabilities
News

Researchers have compiled a list of the 25 key MCP…

2 weeks ago24/09/2025HackMag2170
Adversa researchers have published an analysis of the top 25 Model Context Protocol (MCP) vulnerabilities. They describe this list as “the most comprehensive analysis of MCP vulnerabilities to date.”
CONTINUE READING 🡒
Run Windows on iPhone with UTM: A Guide to Installing Windows on iOS
Mobile

Run Windows on iPhone with UTM: A Guide to Installing…

2 weeks ago13/09/2025ShəLMā4410
Want to play Windows games on your iPhone? Run macOS on an iPad? Or maybe you’ve dreamed of putting Android or Linux on those devices? It’s possible. Sounds crazy? Not really—iOS can run virtual machines with different…
CONTINUE READING 🡒
Cloudflare Reports 22.2 Tbps DDoS Attack
News

Cloudflare Reports 22.2 Tbps DDoS Attack

2 weeks ago24/09/2025HackMag2820
Cloudflare reports a new record in the DDoS arena. The company mitigated a DDoS attack that peaked at a record 22.2 Tbps and 10.6 billion packets per second. Just three weeks ago, the company reported mitigating a…
CONTINUE READING 🡒
US Secret Service discovered 100,000 SIM cards that “could have shut down New York’s cellular network”
News

US Secret Service discovered 100,000 SIM cards that “could have…

2 weeks ago24/09/2025HackMag1890
The U.S. Secret Service reported that in the New York region (the states of New York, New Jersey, and Connecticut), a network of electronic devices was discovered, concentrated around the venue of the UN General Assembly. More…
CONTINUE READING 🡒
5 Simple Python Examples to Inspire You to Learn Python
Security

5 Simple Python Examples to Inspire You to Learn Python

2 weeks ago13/09/2025SkillFactory1480
Over the past decade, Python has exploded in popularity and shows no signs of slowing down—its use in both teaching programming and building applications keeps growing. Few languages can claim such broad appeal across fields as varied…
CONTINUE READING 🡒
Fake password manager apps infect macOS with Atomic Stealer
News

Fake password manager apps infect macOS with Atomic Stealer

2 weeks ago24/09/2025HackMag2690
LastPass developers warn that attackers are targeting macOS users and impersonating popular products, spreading infostealers via GitHub.
CONTINUE READING 🡒
Customer data stolen from automaker Stellantis
News

Customer data stolen from automaker Stellantis

2 weeks ago24/09/2025HackMag3360
Stellantis representatives reported that attackers gained access to a third-party service provider’s platform and stole data on North American customers. Apparently, this attack is related to the Salesforce breach.
CONTINUE READING 🡒
Creating real-time video and audio deepfakes starts at $30
News

Creating real-time video and audio deepfakes starts at $30

2 weeks ago24/09/2025HackMag1800
Experts at Kaspersky Lab discovered darknet ads offering real-time video and audio deepfake creation. The price of such services depends on the complexity and duration of the fake content, starting at $50 for video and $30 for…
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 7 8 … 40 41 42 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com