Samsung Galaxy S24 , Cannon, HP and Sonos Era Were Hacked In Pwn2Own Ireland

Summary With impressive performances in a number of categories, the Viettel Cyber Security team had a commanding lead in the competition for the “Master of Pwn” title on day two of Pwn2Own. Who Are ZDI ? The Zero Day Initiative (ZDI) was established to incentivise researchers to confidentially report 0-day vulnerabilities to the impacted businesses […]

Samsung Galaxy S24 , Cannon, HP and Sonos Era Were Hacked In Pwn2Own Ireland Read More »

Internet Archive Is Hacked Again for the 3rd Time : Stealing exposed GitLab authentication tokens

Dear Users: In spite of frequent alerts that threat actors were stealing exposed GitLab authentication tokens, did you know that Internet Archive has been hacked once more? This time, it happened on their Zendesk email support platform. The Internet Archive’s immense responsibility is to preserve the constantly growing, massive record of human activity that is

Internet Archive Is Hacked Again for the 3rd Time : Stealing exposed GitLab authentication tokens Read More »

Uncovering The Mystery Behind Verified Issac Newton Google Scholar Profile : Pay For Blue Tick Models 

Well As we all know Sir Issac Newton . He Is Now A Verfied Google Scholar but how is this possible he is dead 🙂 In this post by HackingBlogs, we will discuss the attacker’s identity, methods of replication, and potential drawbacks. Isaac Newton is a “Professor of Physics, MIT” with a “Verified email at mit.edu,” according to Google Scholar. Jay Cummings, a published author and maths professor at California State

Uncovering The Mystery Behind Verified Issac Newton Google Scholar Profile : Pay For Blue Tick Models  Read More »

Cisco Was Breached critically : Investigation Claims Made For Data Breach

Cisco Systems, Inc. recently addressed claims made by hackers that the business had just fallen victim to a cyberattack. Although a Cisco official clarified that the company is aware of the claims and is investigating, the company has not yet acknowledged that company data was hacked. The hacker, under by the handle “IntelBroker,” claimed on

Cisco Was Breached critically : Investigation Claims Made For Data Breach Read More »

Casio Was Hacked : Information Leak Caused by Ransomware Attack

Did you Know Casio was hacked earlier this week. Let’s review what happened Casio now admits that it was the victim of a malware attack earlier this month and warns that it also took sensitive personal information from consumers, job hopefuls, and staff members. When Casio issued a warning on Monday about system delay and

Casio Was Hacked : Information Leak Caused by Ransomware Attack Read More »

A 15 Year Old Hacker Found Critical Bug On Zendesk Worth $50,000+ Bounty

Well Who is This Great Kiddo ? Let’s Hear it from Him itself hi, i’m daniel. i’m a 15-year-old with some programming experience and i do a little bug hunting in my free time. here’s the insane story of how I found a single bug that affected over half of all Fortune 500 companies: daniel

A 15 Year Old Hacker Found Critical Bug On Zendesk Worth $50,000+ Bounty Read More »

Star Health Insurance Breached : A Pre Planned Massive Breach of 31 Million Indian Customers

Breaking: Currently taking place in India is one of the biggest hacks ever! For $150k, 31 million row of Star Health Insurance data, including name, DOB, address, phone number, PAN card, and salary for Indians, are being sold. According to hackers He purchased the data from CISO Amarjeet Khanuja. In India, nothing is private. About

Star Health Insurance Breached : A Pre Planned Massive Breach of 31 Million Indian Customers Read More »

NASA Was Hacked : Projects were accessed indirectly through AOSense

STORMOUS X Ransomware leaked data. AOSense provided an indirect means of accessing NASA-related projects and documents. About the Data Exposed $5 million is the STORMOUS ransom sum demanded. 1 terabyte of data was exposed in the incident. Type of data: Accounting. The Information Within has Details- AOSense Commercial Sales, the National Association for the, Atom

NASA Was Hacked : Projects were accessed indirectly through AOSense Read More »

Beware of fake trading apps in the wild ? What is the pig-butchering trick ?

Fake trading platforms appear in app stores with no malware to get past safety checks and let hackers take large amounts of money. A sophisticated and manipulative scam known as “pig butchering” involves scammers manipulating victims into falling for complex investment schemes, usually using bitcoin or other financial instruments. Usually, it would take weeks or

Beware of fake trading apps in the wild ? What is the pig-butchering trick ? Read More »

Fake Solidity Addon Available on VS Code will hack your windows system : Many Undetected

(Fake Solidity Addon) A serious threat on X was reported, where a serious issue regarding installation of unknown VS Code Plugins which could easily exploit your windows system.Let’s see what happened with the researcher and what did he report. Identification Of Illicit Plugin On VS Code Marketplace According to researcher Lorenz Lehmann’s report, He installed

Fake Solidity Addon Available on VS Code will hack your windows system : Many Undetected Read More »

Scroll to Top