Hacker Trends
04/08
04/09
04/10
Statistic
11/01 22:31 (UTC)
04/08
04/09
04/10
10 Posts
Chaining N-days to Compromise All: Part 3 — Windows Driver LPE: Medium to System | by Theori Vulnerability Research | Apr, 2024 | Theori BLOG
https://
blog.theori.io
/chaining-n-days-to-compromise-all-part-3-windows-driver-lpe-medium-to-system-12f7821d97bb?source=social.tw
8 Posts
GMER - the art of exposing Windows rootkits in kernel mode | A blog about rootkits research and the Windows kernel
https://
artemonsecurity.blogspot.com
/2024/04/gmer-art-of-exposing-windows-rootkits.html
7 Posts
Speakers | OffensiveCon
https://
www.offensivecon.org
/speakers/
5 Posts
10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet
https://
thehackernews.com
/2024/04/10-year-old-rubycarp-romanian-hacker.html
5 Posts
Over 90,000 LG Smart TVs may be exposed to remote attacks
https://
www.bleepingcomputer.com
/news/security/over-90-000-lg-smart-tvs-may-be-exposed-to-remote-attacks/
4 Posts
Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs
https://
www.bleepingcomputer.com
/news/microsoft/microsoft-april-2024-patch-tuesday-fixes-150-security-flaws-67-rces/
4 Posts
Targus discloses cyberattack after hackers detected on file servers
https://
www.bleepingcomputer.com
/news/security/targus-discloses-cyberattack-after-hackers-detected-on-file-servers/
4 Posts
GHC-SCW: Ransomware gang stole health data of 533,000 people
https://
www.bleepingcomputer.com
/news/security/ghc-scw-ransomware-gang-stole-health-data-of-533-000-people/
4 Posts
Ransomware gang’s new extortion trick? Calling the front desk | TechCrunch
https://
techcrunch.com
/2024/04/09/ransomware-gang-fail-calling-front-desk-extortion/
4 Posts
New SharePoint flaws help hackers evade detection when stealing files
https://
www.bleepingcomputer.com
/news/security/new-sharepoint-flaws-help-hackers-evade-detection-when-stealing-files/
3 Posts
Tapping into the potential of Memory Dump Emulation
https://
blahcat.github.io
/posts/2024/01/27/tapping-into-the-potential-of-memory-dump-emulation.html
3 Posts
Emulate to Exploitate
https://
exploitthis.ctfd.io
3 Posts
Security Update Guide - Microsoft
https://
msft.it
/60119yPTS
3 Posts
#100DaysofYARA 2024 – Day 100 – MAILSLOT – Cyber Poking
https://
cyberpoking.com
/2024/04/09/100daysofyara-2024-day-100-mailslot/
3 Posts
🔃 Security Update Guide - Loading - Microsoft
https://
msrc.microsoft.com
/update-guide/vulnerability/CVE-2024-26228
3 Posts
CVS Group Restoring Systems Impacted by Cyberattack - SecurityWeek
https://
www.securityweek.com
/cvs-group-restoring-systems-impacted-by-cyberattack/
3 Posts
35-year long identity theft leads to imprisonment for victim | Malwarebytes
https://
www.malwarebytes.com
/blog/news/2024/04/35-year-long-identity-theft-leads-to-imprisonment-for-victim
3 Posts
Critical Rust flaw enables Windows command injection attacks
https://
www.bleepingcomputer.com
/news/security/critical-rust-flaw-enables-windows-command-injection-attacks/
3 Posts
Shazzer - Shared online fuzzing
https://
shazzer.co.uk
/
3 Posts
Zyxel USG SSH Backdoor Attempt | GreyNoise Visualizer
https://
viz.greynoise.io
/tags/zyxel-usg-ssh-backdoor-attempt?days=10
3 Posts
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
https://
thehackernews.com
/2024/04/attackers-using-obfuscation-tools-to.html
3 Posts
bochscpu-python/examples/long_mode_emulate_windows_udump.py at main · hugsy/bochscpu-python · GitHub
https://
github.com
/hugsy/bochscpu-python/blob/main/examples/long_mode_emulate_windows_udump.py
3 Posts
ScrubCrypt used to drop VenomRAT along with many malicious plugins
https://
securityaffairs.com
/161639/cyber-crime/scrubcrypt-venomrat-plugins.html
3 Posts
CVE-2024-24576 (CVSS 10): Rust Flaw Exposes Windows Systems to Command Injection Attacks
https://
securityonline.info
/cve-2024-24576-cvss-10-rust-flaw-exposes-windows-systems-to-command-injection-attacks/
3 Posts
Crowdfense is offering a larger $30M exploit acquisition program
https://
securityaffairs.com
/161584/hacking/crowdfense-30m-exploit-acquisition-program.html
3 Posts
Microsoft patches actively exploited security feature bypass vulnerability (CVE-2024-29988) - Help Net Security
https://
www.helpnetsecurity.com
/2024/04/09/april-2024-patch-tuesday-cve-2024-29988/
3 Posts
Quick References | The Cyber Yeti
https://
www.thecyberyeti.com
/quick-references
3 Posts
Microsoft BitLocker Bypasses are Practical – Compass Security Blog
https://
blog.compass-security.com
/2024/02/microsoft-bitlocker-bypasses-are-practical/
3 Posts
GitHub - RedByte1337/GraphSpy: Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI
https://
github.com
/RedByte1337/GraphSpy
3 Posts
Hackers Targeting Human Rights Activists in Morocco and Western Sahara
https://
thehackernews.com
/2024/04/hackers-targeting-human-rights.html
3 Posts
Webinar Registration - Zoom
https://
us06web.zoom.us
/webinar/register/WN_GjWVolQiRDi7zdLA9gJgWg
3 Posts
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
https://
thehackernews.com
/2024/04/critical-flaws-leave-92000-d-link-nas.html
3 Posts
Samuel Groß | OffensiveCon
https://
www.offensivecon.org
/speakers/2024/samuel-gro%C3%9F.html
3 Posts
https://
securityaffairs.com
/161608/security/china-ai-influence-operations.html
3 Posts
Zero Day Initiative — The April 2024 Security Updates Review
https://
www.zerodayinitiative.com
/blog/2024/4/9/the-april-2024-security-updates-review
3 Posts
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access
https://
thehackernews.com
/2024/04/researchers-discover-lg-smart-tv.html
3 Posts
ICS Patch Tuesday: Siemens Addresses Palo Alto Networks Product Vulnerabilities - SecurityWeek
https://
www.securityweek.com
/ics-patch-tuesday-siemens-addresses-palo-alto-networks-product-vulnerabilities/
3 Posts
Charles Fol | OffensiveCon
https://
www.offensivecon.org
/speakers/2024/charles-fol.html
3 Posts
#OBTS v7.0
https://
objectivebythesea.org
/v7/index.html