HackDig : Dig high-quality web security articles for hackers

Thousands of Magento stores hacked in a few days in largest-ever skimming campaign

Thousands of Magento online stores have been hacked over the past few days as part of the largest ever skimming campaign. Security experts from cybersecurity firm Sansec reported that nearly 2,000 Magento online stores have been hacked over the past few days as part of the largest ever Magecart-style campaign. Most of the hacked sites were running Magento
Publish At:2020-09-14 18:20 | Read:502 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware exploit code infor

Hacker found a way to hack Facebook by exploiting the ImageMagick flaw

The bug hunter Andrew Leonov has described how to exploit an ImageMagick flaw to remotely execute code on a Facebook server. The hacker Andrew Leonov (@4lemon) has described how to exploit the so-called ImageMagick vulnerability to remotely execute code on a Facebook server. The ImageMagick flaw, tracked as CVE-2016-3714, affects the popular image manipulati
Publish At:2017-01-18 13:35 | Read:4696 | Comments:0 | Tags:Breaking News Hacking Social Networks exploit code Facebook

The ImageMagick flaw is being exploited in the wild

The recently discovered ImageMagick critical vulnerability (CVE-2016-3714) is being exploited in the wild for reconnaissance. The security researcher John Graham-Cumming from CloudFlare asserts that his firm recently discovered a critical vulnerability, code named CVE-2016-3714, in the popular image manipulation software, ImageMagick. The flaw could be explo
Publish At:2016-05-11 20:35 | Read:4814 | Comments:0 | Tags:Breaking News Hacking exploit code ImageMagick exploit

An Italian expert discovered two zero-day flaws in MAC OS X

An Italian security researcher has discovered two zero-day vulnerabilities in Apple MAC OS X that could be exploited to gain remote access to a PC. An Italian teenager, Luca Todesco, has found a couple of critical zero-day vulnerabilities in Apple OS X operating system that could be exploited to gain remote access to a PC. The
Publish At:2015-08-17 20:35 | Read:3150 | Comments:0 | Tags:Breaking News Hacking Security Apple exploit code Mac OS X z

Seagate NAS Zero-Day Vulnerability allows Unauthorized Root Access Remotely

Seagate, a popular vendor of hardware solutions, has a critical zero-day vulnerability in its Network Attached Storage (NAS) device software that possibly left thousands of its users vulnerable to hackers.Seagate's Business Storage 2-Bay NAS product, found in home and business networks, is vulnerable to a zero-day Remote Code Execution vulnerability, curre
Publish At:2015-03-01 10:55 | Read:5564 | Comments:0 | Tags:CodeIgniter cookies stealing exploit code hacking news Metas

Crashing Google Email App for Android Just By Sending a Malicious Email

A vulnerability has been discovered in the wildly popular Google’s Stock Android Email App, that could be exploited by malicious attackers to remotely crash your smartphone application just by sending a specially crafted email.A Spain security researcher, Hector Marco, successfully exploited the vulnerability on his Samsung Galaxy S4 Mini running ver
Publish At:2015-02-20 06:26 | Read:2919 | Comments:0 | Tags:Android android apps exploit code hacking news malicious cod

Google Researcher Reveals Zero-Day Windows 8.1 Vulnerability

A Google security researcher, 'James Forshaw' has discovered a privilege escalation vulnerability in Windows 8.1 that could allow a hacker to modify contents or even to take over victims' computers completely, leaving millions of users vulnerable.The researcher also provided a Proof of Concept (PoC) program for the vulnerability. Forshaw says that he has tes
Publish At:2015-01-02 23:45 | Read:4994 | Comments:0 | Tags:exploit code google researcher Microsoft Patch Update privil

New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users

A Serious vulnerability has been discovered in the Web browser installed by default on a large number (Approximately 70%) of Android devices, that could allow an attacker to hijack users' open websites, and there is now a Metasploit module available to easily exploit this dangerous flaw.The exploit targets vulnerability (CVE-2014-6041) in Android versions 4.
Publish At:2014-09-17 07:50 | Read:4112 | Comments:0 | Tags:Android Android Open Source Platform Android Vulnerability b

Attackers Compromise TOR Network to De-Anonymize Users of Hidden Services

A critical vulnerability in Tor — an encrypted anonymizing network considered to be one of the most privacy oriented service, which is used by online users in order to hide their activities from law enforcement, government censors and others — was probably being used to de-anonymize the identity of Tor users, Tor project warned on Wednesday.115 M
Publish At:2014-08-09 16:19 | Read:4976 | Comments:0 | Tags:Cracking Tor Network de-Anonymize Tor Users exploit code hid

Flickr Cross-Site Request Forgery Vulnerability Patched

Yahoo-owned Flickr, one of the biggest online photo management and sharing website in the world was recently impacted by a web application vulnerability, which could allow an attacker to modify users’ profile image.Flickr is one of the most popular photo sharing website with more than 87 million users, therefore some top major target for cybercriminals
Publish At:2014-08-09 16:18 | Read:4967 | Comments:0 | Tags:Cross-site request forgery exploit code Flickr Vulnerability


Tag Cloud