• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up
How to Choose and Set Up an ESP8266 Wi‑Fi Deauther
Security

How to Choose and Set Up an ESP8266 Wi‑Fi Deauther

3 weeks ago19/08/2025vipluxa270
A Wi‑Fi jammer—also called a Wi‑Fi blocker—is a gadget designed to disconnect wireless devices from an access point. Such a device can be used for harmless pranks as well as for criminal purposes, for example to take…
CONTINUE READING 🡒
GodRAT Trojan Disguises Itself as Financial Documents
News

GodRAT Trojan Disguises Itself as Financial Documents

3 weeks ago21/08/2025HackMag140
The new RAT is distributed via malicious .scr files disguised as financial documents. Until March 2025, the attackers sent them through Skype, but after it was shut down they switched to other channels.
CONTINUE READING 🡒
Citizen Lab: VPN apps on Google Play use the same hardcoded password
News

Citizen Lab: VPN apps on Google Play use the same…

3 weeks ago21/08/2025HackMag120
Citizen Lab analysts warned that more than 20 VPN apps on the Google Play store have serious security issues that threaten users’ privacy and allow transmitted data to be decrypted. In total, these apps account for 972…
CONTINUE READING 🡒
DIY Ultra-Cheap Zigbee and Z-Wave Hub for Smart Home Devices
Security

DIY Ultra-Cheap Zigbee and Z-Wave Hub for Smart Home Devices

3 weeks ago19/08/2025Vitaly Yurkin130
Once you start building a smart home, it’s hard to stick to a single vendor. That means you’ll end up with a mishmash of standards that don’t mesh well and a lineup of hubs—each one hogging a…
CONTINUE READING 🡒
Hackers Patch Apache ActiveMQ Vulnerability After Breach
News

Hackers Patch Apache ActiveMQ Vulnerability After Breach

3 weeks ago20/08/2025HackMag60
Researchers from Red Canary report that hackers are using a new Linux malware called DripDropper. For these attacks, the criminals exploit a critical vulnerability in the open-source Apache ActiveMQ software and then patch the bug they exploited.
CONTINUE READING 🡒
5-inch touchscreen display for Raspberry Pi released
News

5-inch touchscreen display for Raspberry Pi released

3 weeks ago20/08/2025HackMag130
The Raspberry Pi developers announced a new touch component for those who use single-board computers to build compact touchscreen devices. The 5-inch Raspberry Pi Touch Display 2 offers a 720×1280 resolution, an IPS multitouch screen, and native…
CONTINUE READING 🡒
August updates broke Windows reset and recovery features
News

August updates broke Windows reset and recovery features

3 weeks ago20/08/2025HackMag110
Microsoft reported that the August security updates for Windows disrupt the reset and recovery features on systems running Windows 10 and earlier releases of Windows 11.
CONTINUE READING 🡒
Set Up a Private VPN Server for Friends with Telegram Payments
Unix

Set Up a Private VPN Server for Friends with Telegram…

3 weeks ago19/08/2025driver0black60
In this article, I’ll show you not only how to build your own WireGuard-based VPN service, but also how to configure it so all your friends can use it. And if you want, they can even chip…
CONTINUE READING 🡒
Tunnelblick vulnerability could be exploited even after uninstallation
News

Tunnelblick vulnerability could be exploited even after uninstallation

3 weeks ago20/08/2025HackMag40
Positive Technologies specialist Yegor Filatov discovered and helped fix a vulnerability in Tunnelblick (a graphical interface for OpenVPN). The issue allowed privilege escalation and data theft. Notably, it could be exploited even in cases of incomplete application…
CONTINUE READING 🡒
New wave of attacks by the PhantomCore cyber-espionage hacking group detected
News

New wave of attacks by the PhantomCore cyber-espionage hacking group…

3 weeks ago20/08/2025HackMag100
From May to July 2025, Positive Technologies specialists discovered more than 180 infected systems in Russian organizations. The malicious activity originated from the PhantomCore group and was targeted exclusively at Russia’s critical infrastructure.
CONTINUE READING 🡒
Quick Guide to Online Anonymity: Encryption Types, Traffic Protection, and Choosing the Right Security Tools
Security

Quick Guide to Online Anonymity: Encryption Types, Traffic Protection, and…

3 weeks ago19/08/2025Mikhail Kireev120
Today, everyday users have access to a solid range of cryptographically robust encryption protocols and the software that implements them. In this article, we’ll survey the main categories of these solutions (even if many are already well…
CONTINUE READING 🡒
Authorities seize $2.8 million in cryptocurrency from a Zeppelin ransomware operator
News

Authorities seize $2.8 million in cryptocurrency from a Zeppelin ransomware…

4 weeks ago19/08/2025HackMag110
The U.S. Department of Justice announced the seizure of more than $2.8 million in cryptocurrency from alleged Zeppelin ransomware operator Yanis Aleksandrovich Antropenko.
CONTINUE READING 🡒
Intercepting and Decoding RF Remote Control Signals with SDR
Security

Intercepting and Decoding RF Remote Control Signals with SDR

4 weeks ago19/08/2025DmitrySpb79210
If the word “radio” only brings to mind grandpa’s old Grundig or a Soviet Okean set, that’s a pretty narrow view. We live in an age of wireless devices, the Internet of Things, 5G, and all sorts…
CONTINUE READING 🡒
The PipeMagic backdoor is active again and exploiting new vulnerabilities
News

The PipeMagic backdoor is active again and exploiting new vulnerabilities

4 weeks ago19/08/2025HackMag90
Experts from Kaspersky Lab and BI.ZONE have warned about the activity of the PipeMagic backdoor. Kaspersky Lab notes the malware’s evolution and key changes in the operators’ tactics, while BI.ZONE conducted a technical analysis of the CVE-2025-29824…
CONTINUE READING 🡒
Mozilla warns: ad blockers may become illegal in Germany
News

Mozilla warns: ad blockers may become illegal in Germany

4 weeks ago19/08/2025HackMag90
Mozilla representatives report that a recent decision by Germany’s Federal Court of Justice (BGH) revives an old legal dispute over whether browser-based ad blockers infringe copyright. The organization fears that this could potentially lead to such tools…
CONTINUE READING 🡒
Vim for Beginners: Stop Fearing the Editor You Can’t Exit and Start Using It
Security

Vim for Beginners: Stop Fearing the Editor You Can’t Exit…

4 weeks ago16/08/2025Eugene Zobnin90
Vim is one of the most polarizing tools ever made. It’s not just an editor—it’s a litmus test that neatly divides programmers, admins, and Unix die-hards into insiders and outsiders. While some ask why we still need…
CONTINUE READING 🡒
Source Code of the ERMAC Banking Trojan Has Leaked
News

Source Code of the ERMAC Banking Trojan Has Leaked

4 weeks ago18/08/2025HackMag160
Information security specialists from Hunt Intelligence have discovered a leak of the source code of the ERMAC 3.0 Android banking trojan. The researchers also report finding serious shortcomings in the malware operators’ infrastructure.
CONTINUE READING 🡒
How to Set Up Zentyal 5.0: Free All‑in‑One Linux Server for Small and Medium Businesses
DevOps

How to Set Up Zentyal 5.0: Free All‑in‑One Linux Server…

4 weeks ago16/08/2025Alexander "Plus" Rak160
I was once asked to provision and configure a server remotely for a small company with about 30 workstations. I went with Zentyal—an Ubuntu-based distribution purpose-built for servers in small and medium-sized corporate networks. I’ll use this…
CONTINUE READING 🡒
Anthropic: Claude will be able to interrupt potentially harmful conversations
News

Anthropic: Claude will be able to interrupt potentially harmful conversations

4 weeks ago18/08/2025HackMag110
Anthropic has announced new capabilities that will allow some of its latest models to end conversations in “rare, extreme cases of persistently harmful or abusive interactions with users.” At the same time, Anthropic states that this is…
CONTINUE READING 🡒
U.S. sanctions Grinex crypto exchange, successor to Garantex
News

U.S. sanctions Grinex crypto exchange, successor to Garantex

4 weeks ago19/08/2025HackMag60
U.S. authorities have imposed sanctions on Grinex — the successor to the Garantex cryptocurrency exchange, which had previously come under sanctions and was allegedly linked to darknet marketplaces and helped criminals launder money.
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 7 8 9 10 … 33 34 35 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com