TIL JSFuck, an esoteric subset of JS that only uses operators, could be used to hack eBay customers by injecting it into item listings. As JSFuck obfuscated the actual code, attackers were able to get browsers that see the listing to run external scripts. (arstechnica.com)

This news is from almost exactly 8 years ago. Softpedia reported 13 days later that eBay partially patched it, but the patch was insufficient. I could not find further updates, but I do know that eBay has since removed more advanced JavaScript (incl. JSFuck) from all listings in 2017....

How to hack a social media account (Phishing method)

In today's interconnected world, social media has become an integral part of our daily lives. From sharing updates with friends to networking with professionals, these platforms offer a myriad of opportunities. However, with great convenience comes great risk, as hackers continually evolve their tactics to compromise user...

Royal Ransomware Rebrands as BlackSuit - Warn FBI and CISA

The cybersecurity landscape is continuously evolving, with threat actors often changing tactics and branding to evade detection and expand their operations. A recent development in this arena involves the Royal ransomware gang. According to a joint advisory from the CISA and the FBI, this group has rebranded itself to BlackSuit....

Researchers Uncover Info-Stealing Campaign Targeting Gaming Community

A report by Sekoia.io has shed light on a targeted campaign against the gaming community that leverages Discord channels and fake download sites to distribute information-stealing malware. The incident came to light after the cloud gaming company Shadow warned its users that their data was compromised....

8Base Group Found Deploying a New Phobos Ransomware Variant

The attackers behind 8Base ransomware have updated their arsenal with a new variant of the Phobos ransomware and other publicly available tools to conduct financially motivated attacks. The new finding comes from Cisco Talos researchers after a spike in 8Base ransomware activity was observed between May and June....

Remcos Rat Propagates via Webhards

The AhnLab Security Intelligence Center (ASEC) discovered that the Remcos RAT malware is being distributed disguised as adult games through webhards in South Korea. The RAT, originally marketed as a legitimate remote administration tool, has evolved into a powerful weapon used by threat actors for unauthorized remote control,...

Windows SmartScreen Bug Abused to Deploy Phemedrone Stealer

Trend Micro discovered a new attack campaign exploiting the now-patched security bypass bug (CVE-2023-36035) in Windows SmartScreen to spread a new strain of the Phemedrone Stealer. The malware targets cryptocurrency wallets and messaging apps, including Telegram, Steam, and Discord....

Researchers Disclose New Lumma Stealer Campaign Distributed via YouTube

FortiGuard Labs researchers recently encountered a new Lumma Stealer campaign that leverages YouTube channels for propagation. The attackers are strategically compromising YouTube accounts and uploading videos that pretend to offer cracked software for legitimate video editing tools such as Vegas Pro....

GULOADER Adds New Anti-Analysis Tactic to Arsenal

Security experts have unmasked a new trick adopted by the GULOADER malware to evade detection by antivirus software. The highly evasive shellcode downloader malware, which typically spreads through emails bearing ZIP archives or links containing a VBScript file, has been found leveraging Vectored Exception Handler (VEH)...

DJvu ransomware Latest Variant Xaro Emerges in the Threat Landscape

A new variant of DJvu ransomware called Xaro has been observed leveraging malware loader delivered via cracked software for propagation. According to researchers at Cybereason, the new variant is being deployed alongside various commodity loaders and infostealers to infect systems....

Lazarus Group Exploit MagicLine4NX Flaw to Launch Supply Chain Attacks

The NCSC and Korea's National Intelligence Service (NIS) have issued a joint report to warn organizations about new supply chain attacks that exploit a zero-day flaw in MagicLine4NX software. Codenamed Operation Dream Magic, these attacks are attributed to the North Korea-based Lazarus threat group....

Media: Ukrainian group, SBU hack Russian Labor Ministry database (kyivindependent.com)

A Ukrainian hacker group working with the Security Service of Ukraine (SBU) hacked into the website of Russia's Labor Ministry and obtained sensitive data concerning the ongoing invasion of Ukraine, Ukrainska Pravda reported on Nov. 29, citing an unnamed security service source.

Crypto Influencer 'Coin Mühendisi' Falls Victim to SIM Card Hack: Potential Loss of $1 Million Sparks Concerns (multidocu.blogspot.com)

Stay informed with the latest news and headlines from around the world. Our news website provides comprehensive coverage of current events, politics, business, technology, entertainment, and more. Get breaking news and in-depth analysis delivered to you daily. Stay connected with the world – read, learn, and stay ahead.

Russians hacked into Ukraine's nationwide university entrance test (www.pravda.com.ua)

Russian hackers carried out attacks on the network and on students’ computers during the NMT-2023 in Ukraine. (NMT is the national multi-subject test, a form of examination that has temporarily replaced the traditional external independent assessments since the beginning of the Russian full-scale invasion – ed.)

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines