- Hacking -

Hacking  Articles -  H 1 2 3  4  5  6  7  8  9  Hacking List -  H  2021  2020  2019  2018  0  1


Date

Name

Category

Web

27.2.19

Card-Skimming Scripts Hide Behind Google Analytics, Angular

Hacking

Threatpost

27.2.19

Modern browser APIs can be abused for hijacking device resources

Hacking

Net-security

27.2.19

Increasing security measures are driving cybercriminals to alter their techniques

Hacking

Net-security

26.2.19

How to Attack and Defend a Prosthetic Arm

Hacking

Securelist

25.2.19

Prosecutors Seek 3-Year Sentence in 'Celebgate' Hacking Case

Hacking

Securityweek

23.2.19

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

Hacking

Thehackernews

20.2.19

Insights on modern adversaries and their tactics, techniques, and procedures

Hacking

Net-security

18.2.19

Toyota PASTA Car-Hacking Tool will be soon on GitHub

Hacking

Securityaffairs

15.2.19

Hackers Target WordPress Sites via WP Cost Estimation Plugin

Hacking

Securityweek

15.2.19

Hacker Breaches Dozens of Sites, Puts 127 Million New Records Up for Sale

Hacking

Thehackernews

14.2.19

Attackers Completely Destroy VFEmail’s Secure Mail Infrastructure

Hacking

Threatpost

13.2.19

Hacker deleted all data from VFEmail Servers, including backups

Hacking

Securityaffairs

13.2.19

Indictment: Hackers Charged With Making Threats to Schools

Hacking

Securityweek

13.2.19

Hackers Destroyed VFEmail Service – Deleted Its Entire Data and Backups

Hacking

Thehackernews

6.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

6.2.19

70 real-life hackers and cybersecurity practitioners share their personal insights

Hacking

Net-security

5.2.19

Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

Hacking

Thehackernews

5.2.19

RDP Servers Can Hack Client Devices: Researchers

Hacking

Securityweek

29.1.19

Authorities Seize Hacked Server Marketplace

Hacking

Securityweek

25.1.19

Hackers Using RDP Are Increasingly Using Network Tunneling to Bypass Protections

Hacking

Securityweek

24.1.19

PHP PEAR official site hacked, tainted package manager distributed for 6 months

Hacking

Securityaffairs

23.1.19

Hacker threatened a family using a Nest Camera to broadcast a fake missile attack alert

HackingSecurityaffairs

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

HackingSecurityweek

23.1.19

Someone Hacked PHP PEAR Site and Replaced the Official Package Manager

HackingThehackernews

23.1.19

Hacker Uses Nest Camera to Broadcast Hoax Nuke Alert

Hacking

Securityweek

23.1.19

Most out of date applications exposed: Shockwave, VLC and Skype top the list

Hacking

Net-security

22.1.19

Ex-Employee Hacks WPML WordPress Plugin Site and Spams Users

Hacking

Bleepingcomputer

21.1.19

Former Employee Hacks Popular WordPress Plugin’s Website

Hacking

Securityweek

18.1.19

Portuguese Hacker Linked to 'Football Leaks' Held in Hungary

HackingSecurityweek

17.1.19

New Magecart Group Targets French Ad Agency

HackingSecurityweek

17.1.19

Hackers infect e-commerce sites by compromising their advertising partner

Hacking

Thehackernews

17.1.19

Fortnite Hacked Via Insecure Single Sign-On

Hacking

Threatpost

17.1.19

Magecart Returns with Advertising Library Tactic

Hacking

Threatpost

17.1.19

Compromised ad company serves Magecart skimming code to hundreds of websites

Hacking

Net-security

16.1.19

Fortnite Flaws Allowed Hackers to Takeover Gamers' Accounts

HackingThehackernews

16.1.19

Two Hackers Charged with Hacking SEC System in Stock-Trading Scheme

HackingThehackernews

15.1.19

New Variant of BEC Seeks to Divert Payroll Deposits

Hacking

Securityweek

15.1.19

Hack a Tesla Model 3, get cash and the car

Hacking

Net-security

15.1.19

Godaddy Injecting JavaScript That May Break Customer Sites

Hacking

Bleepingcomputer

15.1.19

Hack Allows Escape of Play-with-Docker Containers

Hacking

Threatpost

11.1.19

Hackers Using Zero-Width Spaces to Bypass MS Office 365 Protection

HackingThehackernews

7.1.19

unCAPTCHA AI Cracks Google reCAPTCHAs with 90% Accuracy

Hacking

Threatpost

4.1.19

Town of Salem RP Game hacked, more than 7.6M Players affected

HackingSecurityaffairs

3.1.19

Microsoft's Bali Data Bank to Help Users Manage Their Data

HackingBleepingcomputer

3.1.19

Website of Dublin Tram System Hacked

HackingSecurityweek

3.1.19

Thousands of Google Chromecast Devices Hijacked to Promote PewDiePie

HackingThehackernews

3.1.19

Hackers Hijack Smart TVs to Promote PewDiePie

HackingThreatpost

3.1.19

Hacker Streaming PewDiePie Videos on Exposed Chromecast DevicesHackingBleepingcomputer

30.12.18

Shared Tweeting Privileges Easy to Get by Spoofing Phone Numbers

Hacking

Bleepingcomputer

30.12.18

Hackers bypassed vein based authentication with a fake hand

Hacking

Securityaffairs

28.12.18

Guardzilla Home Cameras Open to Anyone Wanting to Watch Their Footage

Hacking

Threatpost

28.12.18

35C3 Day One: Security, Art and Hacking

Hacking

Threatpost

28.12.18

Hijacking Online Accounts Via Hacked Voicemail Systems

Hacking

Threatpost

25.12.18

Orange LiveBox Modems Targeted for SSID and WiFi Info

HackingBleepingcomputer
23.12.18Info on Over 500,000 Students and Staff Exposed in San Diego School District HackHackingBleepingcomputer

18.12.18

Hackers have become increasingly deft at stealing student data

Hacking

Net-security

17.12.18

PewDiePie Hackers Launch Second Printer Siege, According to Reports

Hacking

Threatpost

15.12.18

Logitech Keystroke Injection Flaw Went Unaddressed for Months

Hacking

Net-security

14.12.18

Logitech Keystroke Injection Flaw Went Unaddressed for Months

Hacking

Net-security

13.12.18

France's Travel Alert Registry HackedHackingSecurityweek

11.12.18

Secure Messaging Applications Prone to Session HijackingHackingSecurityweek

11.12.18

Highly Active MuddyWater Hackers Hit 30 Organizations in 2 MonthsHackingSecurityweek

11.12.18

Linux.org Redirected to NSFW Page Spewing Racial Epithets

Hacking

Threatpost

10.12.18

Expert devised a new WiFi hack that works on WPA/WPA2

Hacking

Securityaffairs

10.12.18

Mitigating the risk of Office 365 account hijacking

Hacking

Net-security

10.12.18Linux.org Defaced via DNS HijackHackingSecurityweek
9.12.18STOLEN PENCIL campaign, hackers target academic institutions.HackingSecurityaffairs
9.12.18Pressing F7 in the Command Prompt Lists Previously Entered CommandsHackingBleepingcomputer
6.12.18Warning! Unprivileged Linux Users With UID > INT_MAX Can Execute Any CommandHackingThehackernews

6.12.18

Adobe Flash Zero-Day Leveraged Via Office Docs in Campaign

Hacking

Threatpost

4.12.18

YouTuber PewDiePie Promoted Via 50K Hacked Printers

Hacking

Threatpost

3.12.18Hacker hijacks printers worldwide to promote popular YouTube channelHackingSecurityaffairs

1.12.18

Someone Hacked 150,000 Printers to Promote PewDiePie YouTube ChannelHackingThehackernews

27.11.18

Experts demonstrate how to exfiltrate data using smart bulbsHackingSecurityaffairs
19.11.18

Stopping the Infiltration of Things

Hacking

Threatpost

19.11.18Million password resets and 2FA codes exposed in unsecured Vovox DBHackingPBWCZ.CZ
19.11.186,500+ sites deleted after Dark Web hosting provider Daniel’s Hosting hackHackingPBWCZ.CZ
18.11.18Many ATMs Can be Hacked in Minutes: ReportHackingPBWCZ.CZ

16.11.18

Gmail Bugs Allow Changing From: Field and Spoofing Recipient's Address

HackingBleepingcomputer
15.11.18

Connected Wristwatch Allows Hackers to Stalk, Spy On Children

Hacking

Threatpost

9.11.18689,272 plaintext records of Amex India customers exposed onlineHackingPBWCZ.CZ
8.11.18Evernote Flaw Allows Hackers to Steal Files, Execute CommandsHackingPBWCZ.CZ
8.11.18Hackers Target Telegram, Instagram Users in IranHackingPBWCZ.CZ
7.11.18Hey there! How much are you worth?HackingPBWCZ.CZ
3.11.18FIFA was hacked again, this is the second hack in a yearHackingPBWCZ.CZ
23.10.18Hackers Deface Website of Saudi Investment ForumHackingPBWCZ.CZ
23.10.18Saudi Future Investment Initiative website defaced by the hackersHackingPBWCZ.CZ
18.10.18After 2016 Hack, Illinois Says Election System SecureHackingPBWCZ.CZ
17.10.18A simple message containing certain symbols could crash the Sony PlayStation 4HackingPBWCZ.CZ
10.10.18Hackers can compromise your WhatsApp account by tricking you into answering a video callHackingPBWCZ.CZ
8.10.18Expert presented a new attack technique to compromise MikroTik RoutersHackingPBWCZ.CZ
4.10.18Tesco Bank Fined by UK Regulator Over HackingHackingPBWCZ.CZ
24.9.18Hackers Target Real Estate Deals, With Devastating ImpactHackingPBWCZ.CZ
24.9.18Firefox DoS issue crashes the browser and sometimes the Windows OSHackingPBWCZ.CZ
18.9.18Wisconsin Officials Prepare for Potential Election HackersHackingPBWCZ.CZ
18.9.18MageCart Attackers Compromise Cloud Service Firm FeedifyHackingPBWCZ.CZ
18.9.18EOSBet Gambling application hacked, crooks stole $200,000 worth of EOSHackingPBWCZ.CZ
12.9.18Researchers show how to clone Tesla S Key Fobs in a few secondsHackingPBWCZ.CZ
11.9.18Other 3,700 MikroTik Routers compromised in cryptoJacking campaignsHackingPBWCZ.CZ
10.9.18Attackers Made 9,000 Unauthorized Database Queries in Equifax Hack: ReportHackingPBWCZ.CZ
4.9.18Experts warn of 7,500+ MikroTik Routers that are hijacking owners’ trafficHackingPBWCZ.CZ
4.9.18Compromising Proxy Call Session Control Function (P-CSCF) using VoLTEHackingPBWCZ.CZ
4.9.18Parental control spyware app Family Orbit hacked, pictures of hundreds of monitored children were exposedHackingPBWCZ.CZ
4.9.18John McAfee’s Bitfi cryptocurrency wallet was hacked by a security duoHackingPBWCZ.CZ
4.9.18TrendMicro links Urpage hacking crew to other threat actorsHackingPBWCZ.CZ
29.8.18Man Accused of Hacking Into Bank Account, Stealing $300,000HackingPBWCZ.CZ
28.8.18Google Tells Toomey Hackers Tried to Infiltrate Staff EmailHackingPBWCZ.CZ
24.8.18Intel Simplifies Microcode Update License Following ComplaintsHackingPBWCZ.CZ
22.8.18Dark Tequila AñejoHackingPBWCZ.CZ
21.8.18Anonymous Hackers Target Spain Sites in Catalonia ProtestHackingPBWCZ.CZ
21.8.18Anonymous collective brought down Spain sites to support CataloniaHackingPBWCZ.CZ
16.8.18Hundreds of Instagram accounts were hijacked in a coordinated attackHackingPBWCZ.CZ
15.8.18Foreshadow: New Speculative Execution Flaws Found in Intel CPUsHackingPBWCZ.CZ
14.8.18Key Reuse opens to attacks on IPsec IKE, Cisco, Huawei, ZyXEL products are affectedHackingPBWCZ.CZ
13.8.18 Nigerian Man Found Guilty on Charges Related to HackingHackingPBWCZ.CZ
12.8.18 DNS Hijacking targets Brazilian financial institutionsHackingPBWCZ.CZ
9.8.18Leaked GitHub API Token Exposed Homebrew Software RepositoriesHackingPBWCZ.CZ
8.8.18 BGP Hijacking Attacks Target US Payment ProcessorsHackingPBWCZ.CZ
8.8.18 Hacking WiFi Password in a few steps using a new attack on WPA/WPA2HackingPBWCZ.CZ
7.8.18New Method Discovered for Cracking WPA2 Wi-Fi PasswordsHackingPBWCZ.CZ
6.8.18Ex-Tesla Worker Accused of Hacking Seeks $1M in CounterclaimHackingPBWCZ.CZ
6.8.18TCM Bank: website misconfiguration exposed applicant data for 16 monthsHackingPBWCZ.CZ
3.8.18Student Charged in Elaborate Digital Money Theft SchemeHackingPBWCZ.CZ
23.7.18Half a Billion Enterprise Devices Exposed by DNS RebindingHackingPBWCZ.CZ
23.7.18 Software Supply Chain Increasingly Targeted in Attacks: SurveyHackingPBWCZ.CZ
19.7.18 Charitable Hackers Collaborate in Deep Web ForumsHackingPBWCZ.CZ
18.7.18Trump Says 'Might' Ask Putin to Extradite Accused Russian HackersHackingPBWCZ.CZ
18.7.18Hacker Offers Access to Machine at International Airport for $10HackingPBWCZ.CZ
12.7.18German Hosting Firm DomainFactory HackedHackingPBWCZ.CZ
12.7.18Two More Traders Convicted in Newswire Hacking SchemeHackingPBWCZ.CZ
12.7.18 A tainted version of Arch Linux PDF reader package found in a user-provided AURHackingPBWCZ.CZ
12.7.18Do you want penetrate an airport network? An RDP access to internal machine goes for $10 on the dark web.HackingPBWCZ.CZ
11.7.18HP iLO servers running outdated firmware could be remotely hackedHackingPBWCZ.CZ
11.7.18GoDaddy-owned hosting company Domainfactory hackedHackingPBWCZ.CZ
5.7.18Gentoo Publishes Incident Report After GitHub HackHackingPBWCZ.CZ
26.6.18Misconfigured Java web server component Jolokia expose website at cyber attacksHackingPBWCZ.CZ
24.6.18According to the experts, North Korea is behind the SWIFT attacks in Latin AmericaHackingPBWCZ.CZ
20.6.18Ex-CIA employee Joshua Adam Schulte charged with leaking Vault 7 dumpsHackingPBWCZ.CZ
14.6.18World Cup: US Spy Warns Russians Will Hack Phones, ComputersHackingPBWCZ.CZ
9.6.18Hackers Can Hijack, Sink Ships: ResearchersHackingPBWCZ.CZ
6.6.18 26 Million Users Hit by Ticketfly HackHackingPBWCZ.CZ
2.6.18Visa payments DOWN: Millions affected by a service disruptionHackingPBWCZ.CZ
2.6.18Ticketfly website was compromised, the hacker also stole customers’ dataHackingPBWCZ.CZ
29.5.18The Cobalt Hacking crew is still active even after the arrest of its leaderHackingPBWCZ.CZ
28.5.18Hackers defaced screens at Mashhad airport in Iran protesting the governmentHackingPBWCZ.CZ
27.5.18A bug in T-Mobile site allowed anyone see any customer’s account detailsHackingPBWCZ.CZ
24.5.18Experts warn: it is too easy to steal WiFi access key from TalkTalk ‘s Super RoutersHackingPBWCZ.CZ
20.5.18Misconfigured CalAmp server allowed hacker to take over a lot of vehiclesHackingPBWCZ.CZ
17.5.18 Mexican central bank confirmed that SWIFT hackers stole millions of dollars from Mexican BanksHackingPBWCZ.CZ
16.5.18Hackers Divert Funds From Mexico Banks, Amount Unclear: OfficialHackingPBWCZ.CZ
11.5.18Mining passwords from dozens of public Trello boardsHackingPBWCZ.CZ
11.5.18A Simple Tool Released to Protect Dasan GPON Routers from Remote HackingHackingPBWCZ.CZ
11.5.18 Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe LinksHackingPBWCZ.CZ
11.5.18Tech giant Telstra warns cloud customers they’re at risk of hack due to a SNAFUHackingPBWCZ.CZ
9.5.18Are you using Python module ‘SSH Decorator’? Newer versions include a backdoorHackingPBWCZ.CZ
9.5.18Nintendo Switches Hacked to Run Linux—Unpatchable Exploit ReleasedHackingPBWCZ.CZ
30.4.18PDF Files Can Silently Leak NTLM CredentialsHackingPBWCZ.CZ
28.4.18 How to use weaponized PDF documents to steal Windows credentialsHackingPBWCZ.CZ
27.4.18F-Secure experts devised a Master Key that unlocks millions of hotel roomsHackingPBWCZ.CZ
26.4.18Do Not Disturb app will protect your device from evil maid attacksHackingPBWCZ.CZ
26.4.18Hotel Rooms Around the World Susceptible to Silent BreachHackingPBWCZ.CZ
18.4.18Honeypot Shows the Power of Automation in the Hands of HackersHackingPBWCZ.CZ