Quantcast
Channel: greatest hacks – HACKHUNTING
Browsing latest articles
Browse All 26 View Live

Image may be NSFW.
Clik here to view.

How to Perform Forensic Investigation on Unitronics HMI/PLCs Devices using...

Since at least October 2023, an Iran-based threat actor who goes by the name “CyberAv3ngers” hacked Israeli PLCs in water, energy, shipping and distribution sectors that made devastating damage on the...

View Article


Image may be NSFW.
Clik here to view.

77th Independence Anniversary Greeted with Multiple Defaced websites by Hackers

With India celebrating their 77th Independence day today, there were many hacktivists groups that have attacked several organizations in India. The cyberattacks against the organizations were...

View Article

Image may be NSFW.
Clik here to view.

Ransom Extortion Campaign attacks 110,000 Domains with Leaked Environment...

Hackers have been found to be targeting cloud environments due to their heavy usage by organizations and the sensitive information that is stored. A recent campaign has been discovered in which the...

View Article

Image may be NSFW.
Clik here to view.

Anonymous dismantles Pedophile Platform in Dark Web : “On behalf of Every...

Anonymous is a group of hacktivists that were responsible for several large-scale operations against the Government, Dark Web, Child Pornography and many other social causes including hacking into...

View Article

Image may be NSFW.
Clik here to view.

Toyota Confirms a Data Breach of 240 GB Sensitive Data that was Sold in...

Toyota has been faced with a large data breach after a threat actor has posted about the sale of data in an underground forum. The data accounts to a size of 240 GB according to the post.  The leaked...

View Article


Image may be NSFW.
Clik here to view.

ALBeast Vulnerability: 15,000 Web Apps Vulnerable to Exposure due to an AWS...

A new vulnerability named “ALBeast” has been discovered in AWS ALB authentication feature. It could allow a threat actor to bypass authentication and authorization in applications that use AWS ALB...

View Article

Image may be NSFW.
Clik here to view.

Xiaomi Patched an RCE Vulnerability Before Pwn2Own Toronto 2023 and Removed...

During the Pwn2Own Toronto 2023 Competition, there were several categories and devices that were listed for researchers to target. As for Mobile devices, there were Apple iPhone 14, Google Pixel 7,...

View Article

Image may be NSFW.
Clik here to view.

Software Supply Chain Threat Landscape July 2024: PyPI, NPM, GitHub and macOS

Software Supply Chain is an easy and a massive target for threat actors due to the use of open-source software packages in several organizations. In July 2024, there were several supply chain attacks...

View Article


Image may be NSFW.
Clik here to view.

Pwn2Own Toronto Was NOT THE FIRST! Xiaomi Has Done it Before!

Few days ago, we shared a news about Xiaomi patching Xiaomi 13 Pro devices at the Pwn2Own Toronto 2023 competition. The patching was done specifically on all the loopholes that were about to be...

View Article


Image may be NSFW.
Clik here to view.

Hackers can Even Access a “Cockpit of an Aircraft” with an SQL injection

Airports have separate security lines for Known Crewmember (KCM). KCM is a TSA (Transport Security Administration) program that will have a special lane for pilots and flight attendants. This allows...

View Article
Browsing latest articles
Browse All 26 View Live