Login

Sign Up





Already have an account?Log In

By clicking "Sign Up" you agree to our terms of service and privacy policy


  • Username should be more than 3 characters.
  • Username cannot start with numeric character.
  • Username characters must be from {a-z,0-9}, special characters are not allowed.
  • Make sure the Email is working to receive verification code & password reset link.
  • Password should be more than 6 characters.

Forgot Password



Authentication


Sorry, you have been logged out
Please Login to proceed....

Hacking

Newsletter

Stories

North Korean Hackers Deploy New Golang Malware Durian Against Crypto Firms

The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South.....

Thehackernews

Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. 8.3) has been leveraged to.....

Thehackernews

Cyberspies Hacked Cisco Firewalls to Access Government Networks

Network security appliances like firewalls are meant to keep hackers out. Instead, digital intruders are increasingly targeting them as the weak link that lets them pillage the very systems those.....

Wired

Hackers Linked to Russias Military Claim Credit for Sabotaging US Water Utilities

Russia's military intelligence unit known as Sandworm has, for the past decade, served as the Kremlins most aggressive cyberattack force, triggering blackouts in Ukraine and releasing self-spreading,.....

Wired

A hack nearly gained access to millions of computers. Heres what we should learn from this.

The internet is far less secure than it ought to be. One of the most fascinating and frightening incidents in computer security history started in 2022 with a few pushy emails to the mailing list for.....

Vox

Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses

We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems? Identity Threat Exposures (ITEs) are like secret tunnels for.....

Thehackernews

Security Firm at Center of $30 Million Easter Heist Was Hacked Months Earlier

One of the biggest heists in Los Angeles history took place on Easter when thieves pillaged a money storage facility in the San Fernando Valley during the dead of night. The building, which holds.....

Gizmodo

A Vigilante Hacker Took Down North Koreas Internet. Now Hes Taking Off His Mask

A LITTLE OVER two years have passed since the online vigilante who would call himself P4x fired the first shot in his own one-man cyberwar. Working alone in his coastal Florida home in late January of.....

Wired

Russian state-sponsored hackers compromised Microsoft source code repositories

Microsoft has issued a new update regarding the nation-state attack it uncovered in January. Kremlin-sponsored hackers known as 'Midnight Blizzard' inflicted significant damage, and Redmond confirms.....

Techspot

Russian hackers shift to cloud attacks, US and allies warn

Members of the Five Eyes (FVEY) intelligence alliance warned today that APT29 Russian Foreign Intelligence Service (SVR) hackers are now switching to attacks targeting their victims' cloud services. .....

Bleepingcomputer

Chinese Hackers Using Deepfakes in Advanced Mobile Banking Malware Attacks

A Chinese-speaking threat actor codenamed GoldFactory has been attributed to the development of highly sophisticated banking trojans, including a previously undocumented iOS malware called GoldPickaxe.....

Thehackernews

Critical Mastodon Vulnerability Exposes Decentralized Accounts to Hijacking

The Mastodon decentralized social network has unveiled a critical security flaw, allowing malicious actors to impersonate and seize control of any account. The maintainers issued a concise advisory,.....

Thehackernews