Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

hackmag@infosec.exchangeH

hackmag@infosec.exchange

@hackmag@infosec.exchange
About
Posts
23
Topics
23
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • ⚪️ Microsoft Patches Over 160 Vulnerabilities, Including Two 0‑Days
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Microsoft Patches Over 160 Vulnerabilities, Including Two 0‑Days

    🗨️ As part of the April Patch Tuesday, Microsoft has fixed more than 160 vulnerabilities, including two 0-day issues. This is the second-largest Patch Tuesday in the company’s history — the record is still held by October 2025 (over 170 bugs).…

    🔗 https://hackmag.com/news/april-2026-patches?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ Security on the airwaves.
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Security on the airwaves. Building a security system for wireless networks

    🗨️ Wireless networks are an essential component of any corporate network perimeter. This article discusses techniques enabling you to protect corporate Wi-Fi from WPA handshake capture and PMKID capture, repel GTC Downgrade and RogueAP attacks, and even disable hacker tools. Almost all companies hav…

    🔗 https://hackmag.com/coding/wifi-defense?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #coding

    Uncategorized coding

  • ⚪️ Due to the Axios Breach, OpenAI Revoked a Certificate
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Due to the Axios Breach, OpenAI Revoked a Certificate

    🗨️ OpenAI has announced that it is revoking and reissuing its certificates for signing macOS applications. The reason is a recent attack on the supply chain of the Axios npm package, during which a compromised version made its way into the…

    🔗 https://hackmag.com/news/openai-axios?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ User data stolen from Booking.com
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ User data stolen from Booking.com

    🗨️ Booking.com has reported that unknown attackers gained access to booking information for some users. As a protective measure, the service has forcibly reset PIN codes for current and past bookings, and affected customers have already been notified by email. As…

    🔗 https://hackmag.com/news/booking-leak?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ What Are APTs?
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ What Are APTs? Advanced Cyber Attacks, Stealth Tactics, and Defense Strategies

    🗨️ You’ve probably already read about large‑scale cyberattacks that have hit banks, major corporations, government agencies, and even military facilities. Who’s behind these attacks? What makes them so destructive? And is it actually possible to defend against them? We’ll try to answer these questio…

    🔗 https://hackmag.com/security/wtf-is-apt?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #security

    Uncategorized security

  • Hey folks!
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    Hey folks!

    The HackMag project delivers top-notch content regularly. Our goal is to spread knowledge, share expertise, and build a community. We are always looking for new authors! If you want to contribute (strictly no "guest posting", links exchange or any other SEO junk), please visit https://hackmag.com/for-authors for guidelines and quick contact form.

    Stay tuned!

    Uncategorized

  • ⚪️ Pavel Durov Criticizes WhatsApp Again
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Pavel Durov Criticizes WhatsApp Again

    🗨️ Pavel Durov has once again criticized WhatsApp (owned by Meta, whose activities are recognized as extremist and banned in the Russian Federation), stating that default end-to-end encryption in WhatsApp is “the biggest consumer fraud in history,” misleading billions of people.…

    🔗 https://hackmag.com/news/durov-whatsapp-3?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ React2Shell vulnerability used for automated credential theft
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ React2Shell vulnerability used for automated credential theft

    🗨️ Cisco Talos researchers have discovered a large-scale campaign for automated credential theft exploiting the React2Shell vulnerability (CVE-2025-55182). In just 24 hours, the attackers managed to compromise 766 hosts across various cloud providers worldwide and steal database passwords, AWS keys,…

    🔗 https://hackmag.com/news/react2shell-in-attacks?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ LinkedIn scans over 6,000 Chrome extensions and collects data
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ LinkedIn scans over 6,000 Chrome extensions and collects data

    🗨️ Researchers have noticed that the LinkedIn website uses hidden JavaScript scripts to scan visitors’ browsers: the platform checks for the presence of thousands of extensions and collects data about devices. According to a report prepared by the Fairlinked e.V. association,…

    🔗 https://hackmag.com/news/linkedin-scans?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ Exploiting Git: Achieving Arbitrary Code Execution in the Git Client
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Exploiting Git: Achieving Arbitrary Code Execution in the Git Client

    🗨️ I don’t think I need to explain what Git is — these days everyone uses it, from small startups to tech giants.

    A vulnerability discovered in Git allows an attacker to target users who clone a specially crafted repository. How do you create such a repository? That’s exactly what I’m going to …

    🔗 https://hackmag.com/unix/git-rce?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #unix

    Uncategorized unix

  • ⚪️ Two Critical Spring Framework Vulnerabilities Explained: How They Work and Why They Matter
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Two Critical Spring Framework Vulnerabilities Explained: How They Work and Why They Matter

    🗨️ Spring is one of the most popular Java frameworks, powering hundreds of solutions across many domains. It’s hard to find a serious Java application that doesn’t use Spring. Recently, two critical vulnerabilities were discovered in it that allow remote code execution. Let’s take a look at how they…

    🔗 https://hackmag.com/security/spring-modules-rce?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #security

    Uncategorized security

  • ⚪️ Anthropic Accidentally Leaks Claude Code Source Code
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Anthropic Accidentally Leaks Claude Code Source Code

    🗨️ Developers at Anthropic accidentally made the entire source code of their CLI tool, Claude Code, publicly accessible. The cause of this leak was a forgotten source map file in the npm package. On March 31, 2026, Anthropic released an update…

    🔗 https://hackmag.com/news/claude-code-leak?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ Spotify and Chess[.]com Used to Control MaskGram Stealer
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Spotify and Chess[.]com Used to Control MaskGram Stealer

    🗨️ Researchers from Solar 4RAYS (Solar Group) noticed that hackers are hiding the command-and-control server addresses of the MaskGram stealer in Spotify and Chess[.]com profiles. The malware uses the Dead Drop Resolver (DDR) technique, which allows operators to store command-and-control information…

    🔗 https://hackmag.com/news/maskgram?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ RCE Vulnerability in PolyShell Threatens Magento‑Based Stores
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ RCE Vulnerability in PolyShell Threatens Magento‑Based Stores

    🗨️ Specialists at Sansec have discovered a PolyShell vulnerability that affects all current versions of Magento Open Source and Adobe Commerce 2.x. The issue allows unauthenticated users to upload executable files to the server, which can lead to remote code execution…

    🔗 https://hackmag.com/news/polyshell?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ Critical telnetd vulnerability allows arbitrary code execution
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Critical telnetd vulnerability allows arbitrary code execution

    🗨️ A critical vulnerability has been discovered in the telnetd daemon from the GNU InetUtils package, allowing an unauthenticated attacker to remotely execute arbitrary code with root privileges. The issue was identified by specialists from the Israeli cybersecurity company Dream, and…

    🔗 https://hackmag.com/news/telnetd-rce?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ Drupalgeddon 2 Explained: In-Depth Analysis of the New Critical Drupal Vulnerability
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Drupalgeddon 2 Explained: In-Depth Analysis of the New Critical Drupal Vulnerability

    🗨️ The hour of the second “Drupalgeddon” has come! It’s a new version of the notorious critical vulnerability that once caused a huge stir in one of the most popular CMS platforms. The discovered flaw lets literally any unauthenticated user execute arbitrary commands on the target system with a sing…

    🔗 https://hackmag.com/security/drupalgeddon-2?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #security

    Uncategorized security

  • ⚪️ New DarkSword Exploit Kit for iOS Discovered
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ New DarkSword Exploit Kit for iOS Discovered

    🗨️ Experts from Lookout, iVerify, and the Google Threat Intelligence Group (GTIG) have discovered a new exploit kit for iOS called DarkSword. It targets iPhones running iOS 18.4–18.7 and allows an attacker to fully compromise the device with minimal user interaction.…

    🔗 https://hackmag.com/news/darksword?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ GlassWorm Compromises Over 400 Repositories and Extensions on GitHub, npm, and Open VSX
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ GlassWorm Compromises Over 400 Repositories and Extensions on GitHub, npm, and Open VSX

    🗨️ The large-scale GlassWorm supply chain attack has reached a new level: researchers from Aikido, Socket, Step Security, and the OpenSourceMalware community have collectively identified 433 compromised components — ranging from GitHub repositories to VS Code extensions. Recall that the GlassWorm…

    🔗 https://hackmag.com/news/glassworm-is-back-2?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ Font rendering tricks AI assistants into approving malicious commands
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ Font rendering tricks AI assistants into approving malicious commands

    🗨️ Researchers from LayerX have developed a proof-of-concept attack that makes it possible to hide malicious commands from AI assistants. The attack is based on a discrepancy between what the AI sees in the page’s HTML code and what is actually…

    🔗 https://hackmag.com/news/poisoned-typeface?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news

  • ⚪️ CrackArmor vulnerabilities in Linux AppArmor allow attackers to gain root and bypass container isolation
    hackmag@infosec.exchangeH hackmag@infosec.exchange

    ⚪️ CrackArmor vulnerabilities in Linux AppArmor allow attackers to gain root and bypass container isolation

    🗨️ Researchers from the Qualys Threat Research Unit (TRU) have disclosed information about nine vulnerabilities in the Linux kernel’s AppArmor module. These issues allow an unprivileged user to bypass kernel security mechanisms, gain root privileges, and break out of container isolation.…

    🔗 https://hackmag.com/news/crackarmor?utm_source=mastodon&utm_medium=social&utm_campaign=repost_hackmag_to_socials

    #news

    Uncategorized news
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups