Hacking
-
FBI warns of BADBOX 2.0 botnet infecting smart devices with pre-installed malware, enabling cybercriminals to hijack home networks and conduct illegal activity.
-
A recent analysis reveals that hackers are targeting over 70 Microsoft Exchange servers to steal credentials using JavaScript keyloggers. Learn about the vulnerabilities exploited and the impact on organizations worldwide.
-
A newly registered threat actor claims unauthorized access to the backend panel and customer database of Netmeds, potentially exposing sensitive data of 6.4 million users. Learn more about the implications and assessment of this alleged breach.
-
The FBI warns iPhone and Android users about a surge in DMV text scams, urging immediate deletion of suspicious messages. Learn how to protect yourself from these rising cyber threats.
-
Tesla's Wall Connector was hacked in an 18-minute attack during the Pwn2Own Automotive competition, exposing vulnerabilities in the charging port. Learn about the implications and security measures taken.
-
Posted: June 19, 2025Views: 7A new malware strain called SuperCard exploits hacked Android phones to steal payment card data during contactless transactions. Learn about its infection mechanism and the growing threat to mobile payment security.
-
North Korean hackers from the Famous Chollima group have launched a new Python-based RAT, PylangGhost, targeting Windows and macOS users in the cryptocurrency sector. Learn about the attack methods and implications.
-
Security researcher Sergei Volokitin exposes vulnerabilities in Xiaomi devices, including the S3 smartwatch, at the Hard Pwn conference. Learn about the risks and the importance of hardware security.
-
In a significant international operation, law enforcement agencies have dismantled Archetyp Market, a major dark web marketplace for illicit drugs. Discover the details of this crackdown and its implications for the digital narcotics trade.
-
A new malware campaign exploits Discord's invite system to deliver AsyncRAT and Skuld Stealer, targeting crypto wallets. Learn how attackers hijack links and the risks involved.