Web Hacking

Your blog category

Malicious Update to @solana/web3.js npm Library Steals Private Keys, Puts Crypto Wallets at Risk

Hi everyone, this is the most recent cyber news from Hackingblogs. It is a critical piece, especially for web3 researchers. The attack on the well-known @solana/web3.js library has been compromised. Malicious code that has been inserted into compromised versions allows attackers to drain cryptocurrency wallets by stealing private keys from vulnerable developers and users. The […]

Malicious Update to @solana/web3.js npm Library Steals Private Keys, Puts Crypto Wallets at Risk Read More »

Hacker Group Claims Massive Breach of Microsoft’s Software Licensing Security

Hello, readers of Hackingblogs, are you aware that Massgrave, a well-known piracy group that regularly develops miscroft and its product reaked activation script, just revealed in an X article that it has cracked the code to permanently and freely activate Microsoft Windows and Office products? According to the group, this crack is compatible with all

Hacker Group Claims Massive Breach of Microsoft’s Software Licensing Security Read More »

Russian hackers used Windows 0-Days & Firefox to create a backdoor in a major cyberattack

Zero-Day Vulnerabilities Affect Users and Put Systems at Risk ESET’s cybersecurity experts have discovered a very advanced attack by the Russia-affiliated hacker group RomCom, which targets systems worldwide, including Windows and Firefox, by exploiting two at that point undiscovered vulnerabilities. Users have been put at danger by this effort, as hackers have gained unauthorised access

Russian hackers used Windows 0-Days & Firefox to create a backdoor in a major cyberattack Read More »

World’s Biggest Hacker Bounty Ever: Win a $4.5M Bugatti Chiron Pur Sport!

Hello readers of HackingBlogs, MetaWin.com was hacked on November 3rd, $4.5 million worth of SOL and ETH were taken out of their wallets. The owner is giving their $4.5 million Bugatti Chiron Pur Sport as a reward for the hacker’s capture and the return of the stolen money, even though they have recovered and secured

World’s Biggest Hacker Bounty Ever: Win a $4.5M Bugatti Chiron Pur Sport! Read More »

North Korea’s Secret Cyber Scheme Uncovered: DPRK IT Workers Using Fake US Companies to Steal Money, Linked to China

Hackingblogs: In recent weeks, a disturbing cyber operation linked to North Korea has been uncovered, and it’s important for everyone, especially businesses and tech professionals, to be aware. According to new findings, North Korean hackers, posing as employees of fake US-based tech companies, are stealing money and data. These so-called “DPRK IT Workers” are part

North Korea’s Secret Cyber Scheme Uncovered: DPRK IT Workers Using Fake US Companies to Steal Money, Linked to China Read More »

Warning: OpenAI’s ChatGPT Can Lead You Into Scams—How a Simple Request Cost Me $2.5K!

A serious bug in the openai chatgpt program was reported by a user on X using the handle r_ocky.eth 🍌. In addition to issues with his programming, the issue cost him $2.5k in lost revenue. Let us examine what happened, how he discovered it, and how you might use the article’s main ideas to protect

Warning: OpenAI’s ChatGPT Can Lead You Into Scams—How a Simple Request Cost Me $2.5K! Read More »

Advanced Ransomware Group SafePay Appears Out Of Nowhere Exploiting Multiple Government And MNCs

Safepay ransom is a new ransomware gang that has surfaced and is taking advantage of numerous well-known businesses and government organisations. Let us examine the group’s history, the exploitation it engaged in, and some important conclusions in this piece. Who Is Safepay Ransomware Group ? Two instances of SafePay ransomware distribution across several customer infrastructures,

Advanced Ransomware Group SafePay Appears Out Of Nowhere Exploiting Multiple Government And MNCs Read More »

Vmware’s Critical Severity Vulnerability Found Comprising Of RCE And Heap Overflow

Please be advised, VMware users who follow hackingblogs, that serious vulnerabilities have been found in both VMware vCenter Server and VMware Cloud Foundation. We will talk about these two vulnerabilities in a moment. They are the VMware vCenter Server heap-overflow vulnerability and the VMware vCenter privilege escalation issue. The severity score for this serious vulnerabilities

Vmware’s Critical Severity Vulnerability Found Comprising Of RCE And Heap Overflow Read More »

A Detailed Guide On HTML Parsing and DOMPurify Bypassing for Security Researchers

Kévin – Mizu has openly provided his research papers on HTML parsing and the DOMPurify library. Let me simplify it for you and let us grasp this security research, which is essential for you to know and understand as a security researcher. What Is DOMPurify And Why Is It Used ? In order to prevent

A Detailed Guide On HTML Parsing and DOMPurify Bypassing for Security Researchers Read More »

Beware Of These 8 Fake Application On Google Playstore As They Contain Trojan Android.FakeApp.1669

Hi everyone, this is a crucial article since it details a dangerous false program that has been approved by the Google PlayStore and may be installed. Without further ado, let us get started. We are able to say that not everything that glitters is gold, as in this case, even though applications can be trusted,

Beware Of These 8 Fake Application On Google Playstore As They Contain Trojan Android.FakeApp.1669 Read More »

Scroll to Top