Worst Leak in History: 10 Million Accounts Exposed by Fake Z-Library Scam
Hackingblogs.com
by Dipanshu Kumar
19h ago
Cyberalert: The biggest data leak in history happened. The Z-Library website was illegaly copied by hackers, and as a result, the data of around 10 million users was exposed, as the Cybernews investigation team recently found out. Ten million users mistakenly believed they were on Z-Library, a well-known website for academic papers and books that are pirated online. They were unaware, … Worst Leak in History: 10 Million Accounts Exposed by Fake Z-Library Scam Read More ..read more
Visit website
Soldiers in Israel are victims of Hamas Data leak: Dumping Private details
Hackingblogs.com
by Dipanshu Kumar
3d ago
Online we have many documents that Hamas collected as part of their spying operations on over 2,000 Israeli army soldiers. Will the data leak impact how a fight grows? The collection consists of more than two thousand PDF files, all with the same layout, olive green pages, and the terrorist group’s military wing, Kassam Brigades, on them.The names of Israeli soldiers are contained in each of these files. Along with the names of mothers, fathers, girlfriends, and boyfriends, it also includes the date of birth, national ID card number, phone number, and email address. Misused information can be ..read more
Visit website
New 0day found in Telegram : Just One click and you are Hacked
Hackingblogs.com
by Dipanshu Kumar
4d ago
Researchers at ESET found a zero-day vulnerability in Telegram for Android that permits the sharing of malicious files that appear to be movies. The EvilVideo exploit made it possible for viruses to spread. ESET researchers discovered a zero-day vulnerability that affects Telegram for Android. On June 6, 2024, the exploit, known as EvilVideo, was uploaded on a secret forum. Via Telegram channels, groups, and chats, attackers spread infected files by using the vulnerability to pass them off as multimedia files. After obtaining an example of the exploit, the experts were able to analyse it and n ..read more
Visit website
WazirX Offers $23M Bounty to Recover $234M Stolen by Hacker
Hackingblogs.com
by Dipanshu Kumar
5d ago
The Bug Bounty Hunters Have Good News. In an effort to recover the $234 million in digital assets lost in a recent cyber breach, crypto platform WazirX has started a Bug Bounty program. According to WazirX, the bounty will pay out 10% of the money that is recovered, provided that recovery and verification are completed successfully. The company stated, “This can potentially total $23 million, making it one of the biggest rewards ever provided in the crypto sector.” WazirX said on x ” We are launching a bounty programme to recover the stolen assets in reaction to the recent cyberattack on one ..read more
Visit website
Top 5 mysteries stories of the Dark Web you have never heard
Hackingblogs.com
by Dipanshu Kumar
5d ago
There is a lot of dark activity on the dark web. Talk about subjects that surprise you, like extraterrestrial life and Area 51. I will be discussing some of the most unpredictable and controversial topics on the darkweb in this post because there is still a lot of mystery to be solved. Let’s talk what is darkweb I realise that some of you may already be familiar with the darkweb, but for those of you who are not, let us dive right in. Recognising the various internet layers is crucial to understand the dark web: Surface Internet: This is the portion of the internet that is visible to us on a ..read more
Visit website
Expert Windows Troubleshooting Tips from CrowdStrike
Hackingblogs.com
by Dipanshu Kumar
6d ago
Customers who were impacted by a flaw discovered in a single Windows host content update are currently receiving assistance from CrowdStrike. Linux and Mac hosts are unaffected. There was no cyberattack here. According to Crowdstrike “After the problem was discovered, it was isolated, and a solution was implemented. For the most recent information, we are directing clients to the support site. We will keep our blog updated with comprehensive and frequent public information.“ Details Provided By Crowstrike Among the symptoms are hosts reporting a Falcon sensor-related bugcheck\blue screen err ..read more
Visit website
Microsoft Outage: How to Fix Bsod Blue Screen Of Death
Hackingblogs.com
by Dipanshu Kumar
6d ago
This morning (July 19), an important Microsoft IT outage caused havoc throughout the UK and the rest of the world. A massive global IT outage is impacting hundreds of thousands of companies, including banks, airlines, retailers, and broadcasters. There are delays worldwide and grounded flights operated by major U.S. airlines. “A global ground stop” has been ordered by United, American, and Delta, according to Representative Eric Swalwell, a member of the House subcommittee on cybersecurity. Although Microsoft claimed to have resolved the issue, issues still exist, and blue error displays are ..read more
Visit website
WazirX is Hacked Your digital money at risk : $235 million at loss
Hackingblogs.com
by Dipanshu Kumar
6d ago
Hackingblogs: WazirX , a reputable Indian cryptocurrency exchange, has been hacked. “We are aware that there was a security vulnerability in one of our multisig wallets,” WazirX wrote on X (previously Twitter). “The incident is being looked into by our staff right now. The loss of INR and cryptocurrency will be temporarily suspended to protect your investments.” What bug hunters have to say about the WazirX Bug Bounty programme is shown below In fact, Wazirx runs a bug bounty programme where bug bounty hunter can test and report bugs. However, Wazirx’s bug bounty program has received a lot of ..read more
Visit website
Is Government reading your chats? Whatsapp Vulnerability
Hackingblogs.com
by Dipanshu Kumar
1w ago
Cyberalert: If you believe that you are not being watched, you should be aware that research has revealed WhatsApp vulnerabilities that let government agencies access your private messages. Whatsapp Vulnerability “traffic analysis,” The security team at WhatsApp reported an important danger to its users in March. Users are still at risk from government spying even with strong encryption. The content of 2 billion conversations between users is protected, according to an internal document published by The Intercept, but government agencies can get around encryption to find out who is talking to ..read more
Visit website
Microsoft Is Hacked : Hackers Spreading Atlantida Spyware CVE-2024-38112
Hackingblogs.com
by Dipanshu Kumar
1w ago
Cyberalert: The Void Banshee Cybercrime Group hacks the Microsoft MSHTML protocol. Hackers are breaking the Atlantida malware using the protocol. How does Atlantida Malware work? How Microsoft Was Hacked and How Can You Avoid It? To find the solutions, read the article. What is the Atlantida Malware ? The name of a stealer is Atlantida. This type of malware targets installed systems and programmes in order to obtain confidential data from them. It has been noted that unknown free software and “cracked” software websites are rapidly spreading the Atlantida stealer. Malware of the stealer type ..read more
Visit website

Follow Hackingblogs.com on FeedSpot

Continue with Google
Continue with Apple
OR