Hacker Trends
06/16
06/17
06/18
Statistic
10/22 20:28 (UTC)
06/16
06/17
06/18
8 Posts
Nighthawk 0.3 - Automate All the Things - MDSec
https://
www.mdsec.co.uk
/2024/06/nighthawk-0-3-automate-all-the-things/
8 Posts
Create your first application on the Flipper Zero - The Gistre Blog
https://
blog.gistre.epita.fr
/posts/alan.gueret-2023-09-09-create_your_first_application_on_the_flipper_zero/
6 Posts
New ARM 'TIKTAG' attack impacts Google Chrome, Linux systems
https://
www.bleepingcomputer.com
/news/security/new-arm-tiktag-attack-impacts-google-chrome-linux-systems/
5 Posts
D-Link Technical Support
https://
supportannouncement.us.dlink.com
/security/publication.aspx?name=SAP10398
5 Posts
Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake | WIRED
https://
www.wired.com
/story/epam-snowflake-ticketmaster-breach-shinyhunters/
5 Posts
Hackers use F5 BIG-IP malware to stealthily steal data for years
https://
www.bleepingcomputer.com
/news/security/hackers-use-f5-big-ip-malware-to-stealthily-steal-data-for-years/
4 Posts
GitHub Copilot Chat: From Prompt Injection to Data Exfiltration · Embrace The Red
https://
embracethered.com
/blog/posts/2024/github-copilot-chat-prompt-injection-data-exfiltration/
4 Posts
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
https://
thehackernews.com
/2024/06/hackers-exploit-legitimate-websites-to.html
4 Posts
Thinkst
https://
thinkst.com
/ts
4 Posts
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 2)
https://
www.ambionics.io
/blog/iconv-cve-2024-2961-p2
4 Posts
DLL Jmping: Old Hollow Trampolines in Windows DLL Land - Black Hills Information Security
https://
www.blackhillsinfosec.com
/dll-jmping/
4 Posts
Exploitation of a kernel pool overflow from a restrictive chunk size (CVE-2021-31969) | STAR Labs
https://
starlabs.sg
/blog/2023/11-exploitation-of-a-kernel-pool-overflow-from-a-restrictive-chunk-size-cve-2021-31969/
3 Posts
LA County’s Department of Public Health (DPH) data breach impacted over 200,000 individuals
https://
securityaffairs.com
/164585/data-breach/la-countys-department-of-public-health-dph-data-breach.html
3 Posts
Bypassing Okta’s Passwordless MFA: Technical Analysis and Detection - Rezonate
https://
www.rezonate.io
/blog/bypassing-oktas-passwordless-mfa-technical-analysis-and-detection/
3 Posts
China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
https://
thehackernews.com
/2024/06/china-linked-hackers-infiltrate-east.html
3 Posts
Keytronic Says Personal Information Stolen in Ransomware Attack - SecurityWeek
https://
www.securityweek.com
/keytronic-says-personal-information-stolen-in-ransomware-attack/
3 Posts
[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU
https://
blog.k3170makan.com
/2020/11/linux-kernel-exploitation-0x0-debugging.html
3 Posts
My Favorite Ethical Hacking Books - YouTube
https://
youtu.be
/SWXDST3arF0
3 Posts
ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
https://
thehackernews.com
/2024/06/asus-patches-critical-authentication.html
3 Posts
Online job offers, the reshipping and money mule scams
https://
securityaffairs.com
/164566/security/online-job-offers-reshipping-money-mule-scams.html
3 Posts
Alleged Boss of ‘Scattered Spider’ Hacking Group Arrested – Krebs on Security
https://
krebsonsecurity.com
/2024/06/alleged-boss-of-scattered-spider-hacking-group-arrested/
3 Posts
Untangling Azure Active Directory Principals & Access Permissions · csandker.io
https://
csandker.io
/2022/10/19/Untangling-Azure-Permissions.html
3 Posts
Empire Market owners charged for enabling $430M in dark web transactions
https://
www.bleepingcomputer.com
/news/legal/empire-market-owners-charged-for-enabling-430m-in-dark-web-transactions/
3 Posts
CISA Conducts First AI Cyber Incident Response Exercise - SecurityWeek
https://
www.securityweek.com
/cisa-conducts-first-ai-cyber-incident-response-exercise/
3 Posts
MCTTP 2023 | Talk by Jimmy Bayne - YouTube
https://
www.youtube.com
/watch?v=xdc2ka3qtnM
3 Posts
NiceRAT Malware Targets South Korean Users via Cracked Software
https://
thehackernews.com
/2024/06/nicerat-malware-targets-south-korean.html
3 Posts
Exploiting CVE-2024-21378 – Remote Code Execution in Microsoft Outlook
https://
www.netspi.com
/blog/technical-blog/red-team-operations/microsoft-outlook-remote-code-execution-cve-2024-21378/
3 Posts
IPv6 Security & Capability Testing, Part 2 – The Internet Protocol Blog
https://
theinternetprotocolblog.wordpress.com
/2020/05/26/ipv6-security-capability-testing-part-2/
3 Posts
IPv6 Security & Capability Testing, Part 1 – The Internet Protocol Blog
https://
theinternetprotocolblog.wordpress.com
/2020/05/24/ipv6-security-capability-testing-part-1/