Hacking
-
A new malware campaign exploits Discord's invite system to deliver AsyncRAT and Skuld Stealer, targeting crypto wallets. Learn how attackers hijack links and the risks involved.
-
Discover how the VexTrio scam network exploits WordPress sites to distribute malware and fraudulent schemes. Learn about the tactics used and the impact on global cybersecurity.
-
Posted: June 12, 2025Categories: Bank Phishing, Data Breach, Hacking, Hacker, Banking Trojan, Financial fraud, Fraud ProtectorViews: 11The investigation into the ₹11.55 crore cyber fraud at Himachal Pradesh State Cooperative Bank has led to multiple arrests. Learn about the hacking incident, ongoing investigations, and cybersecurity measures.
-
Posted: June 09, 2025Views: 221Discover how OpenAI has banned ChatGPT accounts associated with Russian, Iranian, and Chinese hacker groups. Learn about the malicious activities, including malware development and social media manipulation, and explore the implications for cybersecurity.
-
The Lazarus hacking group exploited a Google Chrome zero-day vulnerability (CVE-2024-4947) through a fake decentralized finance (DeFi) game, "DeTankZone," targeting individuals in the cryptocurrency sector. This attack demonstrates Lazarus' evolving tactics, using browser exploits and rebranded games to steal sensitive data and potentially cryptocurrency.
-
The Internet Archive, known for its "Wayback Machine," has been hacked, leading to the exposure of a user authentication database with 31 million records. Stolen data includes email addresses, Bcrypt-hashed passwords, and internal user information, putting millions at risk of further cyber threats.
-
Robert Westbrook, a 39-year-old U.K. national, has been charged by the U.S. Department of Justice for allegedly orchestrating a hack-to-trade fraud scheme that netted him approximately $3.75 million in illegal profits by exploiting hacked Microsoft 365 executive emails.
-
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding ongoing cyberattacks on critical infrastructure, particularly targeting Operational Technology (OT) and Industrial Control Systems (ICS). These attacks are being executed using basic methods, such as brute force attacks and exploiting default credentials, impacting vital sectors like water and wastewater systems.
-
A major hacker group has issued a warning, planning to attack Indian websites and critical systems soon. To tackle this,
-
Posted: September 11, 2023Views: 115Spyware masquerading as customized versions of Telegram has been detected on the Google Play Store. These apps have malicious functionalities