U.S. authorities have imposed sanctions on Grinex — the successor to the Garantex cryptocurrency exchange, which had previously come under sanctions and was allegedly linked to darknet marketplaces and helped criminals launder money.
CONTINUE READING 🡒 Hacking with Google: Up-to-Date Google Dork Queries for OSINT and…
Penetration tests usually rely on a toolkit of specialized utilities, but one of them is available to everyone and always at your fingertips—Google. You just need to know how to use it. Google dork queries are clever…
CONTINUE READING 🡒 GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks
Modern graphics cards are essentially compact supercomputers, delivering several teraflops of performance. A multi-GPU setup fits on a desk and can quickly crack most encrypted files. Where you once had to buy and configure a stack of…
CONTINUE READING 🡒 Android vs iOS Security: Is Android Actually Safer?
Strange headline, isn’t it? The author must be nuts to compare iOS security—something even the FBI can’t crack—with that leaky bucket called Android. But I’m serious: Android and iOS can, and should, be compared. Not to prove…
CONTINUE READING 🡒 Privacy Showdown: Comparing the Most Secure Browsers
Web browsers collect a lot of data about users and track their activity online. To counter that, there are dedicated privacy browsers built to protect your privacy and block tracking and ads. Today we’ll review and compare…
CONTINUE READING 🡒 Beyond Packet Sniffers: How to Choose the Right Tool for…
There’s a lot of interesting stuff to be found in network packets. To capture and analyze traffic, we use packet sniffers—and there are plenty to choose from. Today, we’ll look at the most popular sniffers for Windows.
CONTINUE READING 🡒 The HTTP/2 “MadeYouReset” vulnerability can be used for large-scale DDoS…
A vulnerability dubbed MadeYouReset has been discovered in several HTTP/2 implementations. This issue can be used to carry out powerful DDoS attacks.
CONTINUE READING 🡒 Media: The U.S. is secretly embedding trackers in shipments of…
According to media reports, U.S. authorities are secretly placing location-tracking devices in batches of chips that could be illegally diverted to China. The trackers are reportedly being used in shipments of equipment from Dell, SuperMicro, Nvidia, and…
CONTINUE READING 🡒 FPGA Fundamentals: Inside Programmable Logic Architecture and Key Advantages
Imagine a processor that, instead of executing a fixed set of instructions, reconfigures itself for each program and turns the algorithm directly into hardware. That’s exactly how FPGAs work! In this article, I’ll explain how that’s possible…
CONTINUE READING 🡒 F6 researchers analyzed Kinsing group attacks against Russian companies
In the second quarter of 2025, researchers observed a wave of attacks against Russian companies in the finance, logistics, and telecom sectors. Behind these attacks was the Kinsing hacking group (aka H2Miner and Resourceful Wolf), whose goal…
CONTINUE READING 🡒 Turkish crypto exchange BtcTurk suspends operations over suspected $49 million…
The popular Turkish cryptocurrency platform BtcTurk has temporarily suspended deposits and withdrawals after cybersecurity specialists from several different companies detected suspicious outflows totaling $49 million.
CONTINUE READING 🡒 Windows 10 Hardening Guide: Secure, Private, and Optimized Setup for…
Over the years, Windows has evolved from a graphical shell on top of MS-DOS into a client front end for Microsoft’s cloud services. Turning it into a fully self-sufficient OS is probably unrealistic, but with some deep…
CONTINUE READING 🡒 Gemini may have exposed user data via Google Calendar
Google developers have fixed a bug that allowed malicious Google Calendar invitations to remotely take control of Gemini agents running on a victim’s device and steal user data.
CONTINUE READING 🡒 Fortress assault: Bypassing authentication in FortiOS and FortiProxy
This article narrates my searches for the CVE-2024-55591 vulnerability in FortiOS and FortiProxy disclosed by Fortinet. This security hole makes it possible to bypass authentication using an alternate path or channel (CWE-288) and enables a remote attacker to gain administrator privileges and execute arbitrary commands.
CONTINUE READING 🡒 How to Encrypt XMPP (Jabber) Chats: Step-by-Step Guide
I don’t think I need to explain why someone might want a reliable, secure communication channel. Sure, you can encrypt messages and send them by email, but the very fact that you’re sending something can be telling.…
CONTINUE READING 🡒 Microsoft patched over 100 vulnerabilities
As part of the August Patch Tuesday, Microsoft fixed 107 vulnerabilities in its products. Among them was one zero-day vulnerability in Windows Kerberos.
CONTINUE READING 🡒 Magic Mouse steals 650,000 bank card details every month
After the shutdown of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution has gained popularity among criminals. According to experts at Mnemonic, Magic Mouse is already helping steal the…
CONTINUE READING 🡒 Modlishka Reverse-Proxy Phishing: How Attackers Bypass Two-Factor Authentication
Underground forums are rife with offers to hack accounts. In most cases, attackers rely on phishing with spoofed login pages. However, that approach doesn’t work when the user receives an SMS verification code. I’ll show how to…
CONTINUE READING 🡒 Phrack publishes article on breaching a North Korean hacker’s systems
Hackers going by the handles Saber and cyb0rg published an article in the latest issue of Phrack (the legendary e-zine that has been published since 1985). The anniversary issue marking Phrack’s 40th year was distributed at the…
CONTINUE READING 🡒 Best Privacy-Focused Linux Distros for Bypassing Censorship and Protecting Against…
Maybe you’ve already used the Tails distribution—or even run it daily. But it’s not the only OS that can mask your presence online and help you bypass regional restrictions. In this article, we’ll look at five Tails…
CONTINUE READING 🡒