Hacker Trends
10/27
10/28
10/29
Statistic
11/26 04:34 (UTC)
10/27
10/28
10/29
6 Posts
GitHub - nevesnunes/z80-sans: OpenType font that disassembles Z80 instructions
https://
github.com
/nevesnunes/z80-sans
5 Posts
US says Chinese hackers breached multiple telecom providers
https://
www.bleepingcomputer.com
/news/security/us-says-chinese-hackers-breached-multiple-telecom-providers/
4 Posts
Redline, Meta infostealer malware operations seized by police
https://
www.bleepingcomputer.com
/news/legal/redline-meta-infostealer-malware-operations-seized-by-police/
4 Posts
Inside the Open Directory of the “You Dun” Threat Group – The DFIR Report
https://
thedfirreport.com
/2024/10/28/inside-the-open-directory-of-the-you-dun-threat-group/
4 Posts
GitHub - xaitax/Chrome-App-Bound-Encryption-Decryption: Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protections.
https://
github.com
/xaitax/Chrome-App-Bound-Encryption-Decryption
4 Posts
New tool bypasses Google Chrome’s new cookie encryption system
https://
www.bleepingcomputer.com
/news/security/new-tool-bypasses-google-chromes-new-cookie-encryption-system/
3 Posts
https://
www.bleepingcomputer.com
/news/security/russia-targets-ukrainian-conscripts-with-windows-android-malware/
3 Posts
Anatomy of an LLM RCE
https://
www.cyberark.com
/resources/threat-research-blog/anatomy-of-an-llm-rce
3 Posts
Europol warns about counterfeit goods and the criminals behind them | Malwarebytes
https://
www.malwarebytes.com
/blog/news/2024/10/europol-warns-about-counterfeit-goods-and-the-criminals-behind-them
3 Posts
Fog ransomware targets SonicWall VPNs to breach corporate networks
https://
www.bleepingcomputer.com
/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/
3 Posts
BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers
https://
thehackernews.com
/2024/10/beavertail-malware-resurfaces-in.html
3 Posts
Russian Espionage Group Targets Ukrainian Military with Malware via Telegram
https://
thehackernews.com
/2024/10/russian-espionage-group-targets.html
3 Posts
How I Accessed Microsoft’s ServiceNow — Exposing ALL Microsoft Employee emails, Chat Support Transcripts & Attachments | by Moblig | Oct, 2024 | Medium
https://
medium.com
/@moblig/how-i-accessed-microsofts-servicenow-exposing-all-microsoft-employee-emails-chat-support-5f8d535eb63b
3 Posts
Black Basta affiliates used Microsoft Teams in recent attacks
https://
securityaffairs.com
/170311/cyber-crime/black-basta-ransomware-microsoft-teams.html
3 Posts
Free, France’s second largest ISP, confirms data breach after leak
https://
www.bleepingcomputer.com
/news/security/free-frances-second-largest-isp-confirms-data-breach-after-leak/
3 Posts
Zero Day Initiative — Unpatched Powerful SSRF in Exchange OWA – Getting Response Through Attachments
https://
www.thezdi.com
/blog/2023/11/1/unpatched-powerful-ssrf-in-exchange-owa-getting-response-through-attachments
3 Posts
Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services
https://
thehackernews.com
/2024/10/chinese-hackers-use-cloudscout-toolset.html
3 Posts
https://
www.redthreatsec.com
/blog/greenlightspart1
3 Posts
Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel
https://
thehackernews.com
/2024/10/researchers-uncover-os-downgrade.html
3 Posts
VMWare vCenter Server CVE-2024-38812 DCERPC Vulnerability | SonicWall
https://
blog.sonicwall.com
/en-us/2024/10/vmware-vcenter-server-cve-2024-38812-dcerpc-vulnerability/
3 Posts
A crime ring compromised Italian state databases reselling stolen info
https://
securityaffairs.com
/170328/data-breach/a-crime-ring-compromised-italian-state-databases.html
3 Posts
Recon Royale - Hacker's Arena
http://
recon-royale.com
3 Posts
https://
blog.scrt.ch
/2024/10/28/privilege-escalation-through-tpm-sniffing-when-bitlocker-pin-is-enabled/
3 Posts
https://
www.securityweek.com
/delta-sues-cybersecurity-firm-crowdstrike-over-tech-outage-that-canceled-flights/
3 Posts
Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials
https://
thehackernews.com
/2024/10/cybercriminals-use-webflow-to-deceive.html