Hacking
-
Tesla's Wall Connector was hacked in an 18-minute attack during the Pwn2Own Automotive competition, exposing vulnerabilities in the charging port. Learn about the implications and security measures taken.
-
Posted: June 19, 2025Views: 12A new malware strain called SuperCard exploits hacked Android phones to steal payment card data during contactless transactions. Learn about its infection mechanism and the growing threat to mobile payment security.
-
North Korean hackers from the Famous Chollima group have launched a new Python-based RAT, PylangGhost, targeting Windows and macOS users in the cryptocurrency sector. Learn about the attack methods and implications.
-
Security researcher Sergei Volokitin exposes vulnerabilities in Xiaomi devices, including the S3 smartwatch, at the Hard Pwn conference. Learn about the risks and the importance of hardware security.
-
In a significant international operation, law enforcement agencies have dismantled Archetyp Market, a major dark web marketplace for illicit drugs. Discover the details of this crackdown and its implications for the digital narcotics trade.
-
A new malware campaign exploits Discord's invite system to deliver AsyncRAT and Skuld Stealer, targeting crypto wallets. Learn how attackers hijack links and the risks involved.
-
Discover how the VexTrio scam network exploits WordPress sites to distribute malware and fraudulent schemes. Learn about the tactics used and the impact on global cybersecurity.
-
Posted: June 12, 2025Categories: Bank Phishing, Data Breach, Hacking, Hacker, Banking Trojan, Financial fraud, Fraud ProtectorViews: 26The investigation into the ₹11.55 crore cyber fraud at Himachal Pradesh State Cooperative Bank has led to multiple arrests. Learn about the hacking incident, ongoing investigations, and cybersecurity measures.
-
Posted: June 09, 2025Views: 436Discover how OpenAI has banned ChatGPT accounts associated with Russian, Iranian, and Chinese hacker groups. Learn about the malicious activities, including malware development and social media manipulation, and explore the implications for cybersecurity.
-
The Lazarus hacking group exploited a Google Chrome zero-day vulnerability (CVE-2024-4947) through a fake decentralized finance (DeFi) game, "DeTankZone," targeting individuals in the cryptocurrency sector. This attack demonstrates Lazarus' evolving tactics, using browser exploits and rebranded games to steal sensitive data and potentially cryptocurrency.