Author name: Dipanshu Kumar

Russian hackers used Windows 0-Days & Firefox to create a backdoor in a major cyberattack

Zero-Day Vulnerabilities Affect Users and Put Systems at Risk ESET’s cybersecurity experts have discovered a very advanced attack by the Russia-affiliated hacker group RomCom, which targets systems worldwide, including Windows and Firefox, by exploiting two at that point undiscovered vulnerabilities. Users have been put at danger by this effort, as hackers have gained unauthorised access …

Russian hackers used Windows 0-Days & Firefox to create a backdoor in a major cyberattack Read More »

World’s Biggest Hacker Bounty Ever: Win a $4.5M Bugatti Chiron Pur Sport!

Hello readers of HackingBlogs, MetaWin.com was hacked on November 3rd, $4.5 million worth of SOL and ETH were taken out of their wallets. The owner is giving their $4.5 million Bugatti Chiron Pur Sport as a reward for the hacker’s capture and the return of the stolen money, even though they have recovered and secured …

World’s Biggest Hacker Bounty Ever: Win a $4.5M Bugatti Chiron Pur Sport! Read More »

North Korea’s Secret Cyber Scheme Uncovered: DPRK IT Workers Using Fake US Companies to Steal Money, Linked to China

Hackingblogs: In recent weeks, a disturbing cyber operation linked to North Korea has been uncovered, and it’s important for everyone, especially businesses and tech professionals, to be aware. According to new findings, North Korean hackers, posing as employees of fake US-based tech companies, are stealing money and data. These so-called “DPRK IT Workers” are part …

North Korea’s Secret Cyber Scheme Uncovered: DPRK IT Workers Using Fake US Companies to Steal Money, Linked to China Read More »

Warning: OpenAI’s ChatGPT Can Lead You Into Scams—How a Simple Request Cost Me $2.5K!

A serious bug in the openai chatgpt program was reported by a user on X using the handle r_ocky.eth 🍌. In addition to issues with his programming, the issue cost him $2.5k in lost revenue. Let us examine what happened, how he discovered it, and how you might use the article’s main ideas to protect …

Warning: OpenAI’s ChatGPT Can Lead You Into Scams—How a Simple Request Cost Me $2.5K! Read More »

Advanced Ransomware Group SafePay Appears Out Of Nowhere Exploiting Multiple Government And MNCs

Safepay ransom is a new ransomware gang that has surfaced and is taking advantage of numerous well-known businesses and government organisations. Let us examine the group’s history, the exploitation it engaged in, and some important conclusions in this piece. Who Is Safepay Ransomware Group ? Two instances of SafePay ransomware distribution across several customer infrastructures, …

Advanced Ransomware Group SafePay Appears Out Of Nowhere Exploiting Multiple Government And MNCs Read More »

Vmware’s Critical Severity Vulnerability Found Comprising Of RCE And Heap Overflow

Please be advised, VMware users who follow hackingblogs, that serious vulnerabilities have been found in both VMware vCenter Server and VMware Cloud Foundation. We will talk about these two vulnerabilities in a moment. They are the VMware vCenter Server heap-overflow vulnerability and the VMware vCenter privilege escalation issue. The severity score for this serious vulnerabilities …

Vmware’s Critical Severity Vulnerability Found Comprising Of RCE And Heap Overflow Read More »

A Detailed Guide On HTML Parsing and DOMPurify Bypassing for Security Researchers

Kévin – Mizu has openly provided his research papers on HTML parsing and the DOMPurify library. Let me simplify it for you and let us grasp this security research, which is essential for you to know and understand as a security researcher. What Is DOMPurify And Why Is It Used ? In order to prevent …

A Detailed Guide On HTML Parsing and DOMPurify Bypassing for Security Researchers Read More »

Beware Of These 8 Fake Application On Google Playstore As They Contain Trojan Android.FakeApp.1669

Hi everyone, this is a crucial article since it details a dangerous false program that has been approved by the Google PlayStore and may be installed. Without further ado, let us get started. We are able to say that not everything that glitters is gold, as in this case, even though applications can be trusted, …

Beware Of These 8 Fake Application On Google Playstore As They Contain Trojan Android.FakeApp.1669 Read More »

Microsoft Zero Day Vulnerability Will Let An Attacker Get Into User’s PC And Exploit Local Privilege Escalation

Once an attacker gets onto a victim’s computer, they can exploit an LPE (Local Privilege Escalation) vulnerability to then take over the system and follow through with the attack. The vulnerability was discovered as part of a regular study of popular programs and the vendor was informed immediately as part of the responsible disclosure policy. The Microsoft team patched the issue shortly after, and all users should install the update as soon as possible, Head of the …

Microsoft Zero Day Vulnerability Will Let An Attacker Get Into User’s PC And Exploit Local Privilege Escalation Read More »

Zip Concatenation: Your Windows System Can Be Easily Hacked Using This New Technique

Greetings, my dear hacker family. As you are aware, hackers like us are constantly improving their methods of evading security measures. We have developed a new method to take advantage of systems. This method was recently used to hack a Windows system, and the worst part is that it is simple to set up but …

Zip Concatenation: Your Windows System Can Be Easily Hacked Using This New Technique Read More »

Scroll to Top