Author name: Dipanshu Kumar

Internet Archive Is Hacked Again for the 3rd Time : Stealing exposed GitLab authentication tokens

Dear Users: In spite of frequent alerts that threat actors were stealing exposed GitLab authentication tokens, did you know that Internet Archive has been hacked once more? This time, it happened on their Zendesk email support platform. The Internet Archive’s immense responsibility is to preserve the constantly growing, massive record of human activity that is …

Internet Archive Is Hacked Again for the 3rd Time : Stealing exposed GitLab authentication tokens Read More »

Uncovering The Mystery Behind Verified Issac Newton Google Scholar Profile : Pay For Blue Tick Models 

Well As we all know Sir Issac Newton . He Is Now A Verfied Google Scholar but how is this possible he is dead 🙂 In this post by HackingBlogs, we will discuss the attacker’s identity, methods of replication, and potential drawbacks. Isaac Newton is a “Professor of Physics, MIT” with a “Verified email at mit.edu,” according to Google Scholar. Jay Cummings, a published author and maths professor at California State …

Uncovering The Mystery Behind Verified Issac Newton Google Scholar Profile : Pay For Blue Tick Models  Read More »

Cisco Was Breached critically : Investigation Claims Made For Data Breach

Cisco Systems, Inc. recently addressed claims made by hackers that the business had just fallen victim to a cyberattack. Although a Cisco official clarified that the company is aware of the claims and is investigating, the company has not yet acknowledged that company data was hacked. The hacker, under by the handle “IntelBroker,” claimed on …

Cisco Was Breached critically : Investigation Claims Made For Data Breach Read More »

Casio Was Hacked : Information Leak Caused by Ransomware Attack

Did you Know Casio was hacked earlier this week. Let’s review what happened Casio now admits that it was the victim of a malware attack earlier this month and warns that it also took sensitive personal information from consumers, job hopefuls, and staff members. When Casio issued a warning on Monday about system delay and …

Casio Was Hacked : Information Leak Caused by Ransomware Attack Read More »

A 15 Year Old Hacker Found Critical Bug On Zendesk Worth $50,000+ Bounty

Well Who is This Great Kiddo ? Let’s Hear it from Him itself hi, i’m daniel. i’m a 15-year-old with some programming experience and i do a little bug hunting in my free time. here’s the insane story of how I found a single bug that affected over half of all Fortune 500 companies: daniel …

A 15 Year Old Hacker Found Critical Bug On Zendesk Worth $50,000+ Bounty Read More »

Star Health Insurance Breached : A Pre Planned Massive Breach of 31 Million Indian Customers

Breaking: Currently taking place in India is one of the biggest hacks ever! For $150k, 31 million row of Star Health Insurance data, including name, DOB, address, phone number, PAN card, and salary for Indians, are being sold. According to hackers He purchased the data from CISO Amarjeet Khanuja. In India, nothing is private. About …

Star Health Insurance Breached : A Pre Planned Massive Breach of 31 Million Indian Customers Read More »

NASA Was Hacked : Projects were accessed indirectly through AOSense

STORMOUS X Ransomware leaked data. AOSense provided an indirect means of accessing NASA-related projects and documents. About the Data Exposed $5 million is the STORMOUS ransom sum demanded. 1 terabyte of data was exposed in the incident. Type of data: Accounting. The Information Within has Details- AOSense Commercial Sales, the National Association for the, Atom …

NASA Was Hacked : Projects were accessed indirectly through AOSense Read More »

Beware of fake trading apps in the wild ? What is the pig-butchering trick ?

Fake trading platforms appear in app stores with no malware to get past safety checks and let hackers take large amounts of money. A sophisticated and manipulative scam known as “pig butchering” involves scammers manipulating victims into falling for complex investment schemes, usually using bitcoin or other financial instruments. Usually, it would take weeks or …

Beware of fake trading apps in the wild ? What is the pig-butchering trick ? Read More »

Fake Solidity Addon Available on VS Code will hack your windows system : Many Undetected

(Fake Solidity Addon) A serious threat on X was reported, where a serious issue regarding installation of unknown VS Code Plugins which could easily exploit your windows system.Let’s see what happened with the researcher and what did he report. Identification Of Illicit Plugin On VS Code Marketplace According to researcher Lorenz Lehmann’s report, He installed …

Fake Solidity Addon Available on VS Code will hack your windows system : Many Undetected Read More »

Critical printing issues Cups put hundreds of thousands of Linux systems at risk: How to Mitigate

Linux systems are vulnerable to multiple unpatched vulnerabilities, as revealed by security researcher Simone Margaritelli. Attackers can execute remote code on Linux computers that use the CUPS (Common Unix Printing System) printing system due to a serious vulnerability. CUPS, It can listen on UDP port 631 if the cups-browsed daemon is activated, which is not …

Critical printing issues Cups put hundreds of thousands of Linux systems at risk: How to Mitigate Read More »

Scroll to Top