Author name: Dipanshu Kumar

Real Vs Fake : Python Users Beware Of pycord-self , a PyPi package stealing Discord auth tokens

Hello Hackingblogs Viewers, Discord developers are the target of a malicious Python package called “pycord-self” that was found on the Python Package Index (PyPI). This package is a significant security risk since it installs a backdoor for remote access and steals authentication tokens. Claiming to be the authentic “discord.py-self” library, it has been downloaded 885 …

Real Vs Fake : Python Users Beware Of pycord-self , a PyPi package stealing Discord auth tokens Read More »

Sensitive US military and Mossad secrets, including troop details and covert operations, have been leaked.

@database_military Shares Explosive New Leaks: A collection of confidential material was recently made public by a Telegram channel providing details about secret US military and Mossad operations. This contains information on troop movements, secret operations, advanced technology, and classified Middle Eastern installations. We examine the various breaches and their consequences in further detail in this …

Sensitive US military and Mossad secrets, including troop details and covert operations, have been leaked. Read More »

15,000 Fortinet firewall configurations with VPN passwords leaked on the darknet

Over 15,000 plaintext VPN passwords and Fortinet firewall configurations were made public on the darknet due to a significant data breach. The dataset, which was leaked by a new hacking group known as the “Belsen Group,” covers 145 nations and has major effects in Germany, the United States, and Mexico. The Fortinet breach, which was …

15,000 Fortinet firewall configurations with VPN passwords leaked on the darknet Read More »

Microsoft Found Critical Vulnerability On Apple MacOS : CVE-2024-44243 SIP Bypass

I know Microsoft Finding Flaw In Apple MacOS is definetly something wild. Well let’s deep dive into the CVE-2024-44243 that was detected by Microsoft. A Brief Summary Microsoft Threat Intelligence had discovered a now-patched security weakness affecting Apple macOS. An attacker working as “root” could have bypassed the operating system’s System Integrity Protection (SIP) and …

Microsoft Found Critical Vulnerability On Apple MacOS : CVE-2024-44243 SIP Bypass Read More »

All It Takes Is One Simple Google Search From Being Watched By Hackers, Wanna Know Why ?

Hello There Hacker Family, This time I come again with Google Dorking Which was one of the very first articles on this website. Today I will be talking about how far you can go with using them specifically focusing on webcam accessing. Remember all this done her is for education purpose any misinterpretation or usage …

All It Takes Is One Simple Google Search From Being Watched By Hackers, Wanna Know Why ? Read More »

Ukrainian hackers claim to have launched a horrific cyberattack against Russian internet provider Nodex

Nodex, a major Russian internet provider, revealed on Tuesday that a cyberattack had seriously damaged its network. The business believes that the attack came from Ukraine and has called it “planned.” What Was The Impact Of This Attack ? The event was disclosed by St. Petersburg-based Nodex in a statement posted on the Russian social …

Ukrainian hackers claim to have launched a horrific cyberattack against Russian internet provider Nodex Read More »

“Phish-Free” PayPal Scam: A Clever New Phishing Attack You Need to Know About

The most recent PayPal-related fraud is an excellent example of the constantly developing strategies used by cybercriminals to trick innocent people. In a recent blog post, Carl Windsor, the Chief Information Security Officer (CISO) of Fortinet, detailed this concerning scam and called it a “phish-free phishing attack.” This type of phishing scam is far more …

“Phish-Free” PayPal Scam: A Clever New Phishing Attack You Need to Know About Read More »

Do You Want To Access What the Government Stop You From, Use Tor’s New Webtunnel

The Tor Project’s Anti-Censorship Team launched WebTunnel, a new bridge designed to improve access to the Tor network for users in areas with strict internet censorship, on March 12, 2024, which is World Day Against Cyber Censorship. What Is Censorship with regards to the Tor Webtunnel ? According to the Tor Project’s WebTunnel and the …

Do You Want To Access What the Government Stop You From, Use Tor’s New Webtunnel Read More »

April 2024 Famous Anonymous Group Broke Into Israel Defense Forces Now Exposed 22GB Worth Data

Summary Of The Incident : Anonymous, a hacker group, has taken credit for the Israeli Defence Forces (IDF) attack, claiming to have taken over 22 gigabytes of data, including over 233,000 documents. These files, which include Word documents, PowerPoint presentations, and PDFs, are said to contain classified military data. Although the documents’ validity has not …

April 2024 Famous Anonymous Group Broke Into Israel Defense Forces Now Exposed 22GB Worth Data Read More »

HackTrack Hackingblogs Weekly Breach Letter : HBW106

Welcome to HackingBlogs’ first Weekly Data Breach Roundup, where we provide a brief overview of the biggest data breaches that shocked the online world in the last week. We will go over the specifics of these breaches, the industries they affected, and the actions businesses are—or ought to take—to strengthen their defences in our weekly …

HackTrack Hackingblogs Weekly Breach Letter : HBW106 Read More »

Scroll to Top