Tor network will pay you to hack it through new bug bounty program
Tor wants to find bugs which could compromise the identity of its users. The Tor Project has joined with HackerOne to launch a public bug bounty program aimed at findingRead More →
Tor wants to find bugs which could compromise the identity of its users. The Tor Project has joined with HackerOne to launch a public bug bounty program aimed at findingRead More →
While doing my normal scan through various sites that are known to push unwanted programs, I ran across a new version of a Chrome extension family that hijacks searches done onRead More →
A bug in your image thumbnailer could represent a new attack vector for hackers that can exploit it for script injection. Another day, another bug in a popular application. A bugRead More →
Microsoft’s Antimalware Scan Interface (AMSI) was introduced in Windows 10 as a standard interface that provides the ability for AV engines to apply signatures to buffers both in memory andRead More →
Attackers could remotely hack and hijack Ninebot miniPRO hoverboard in just 20 seconds of continuous Bluetooth connection. Do you have an hoverboard? This news will probably surprise you because accordingRead More →
Today, in coordinated press releases, the US Department of Justice (DOJ) and Europol announced the takedown of two Dark Web marketplaces — AlphaBay and Hansa Market. US Attorney General JeffRead More →
An unknown hacker has used a vulnerability in an Ethereum wallet client to steal over 153,000 Ether, worth over $30 million dollars. The hack was possible due to a flawRead More →
This spring, the author of the NukeBot banking Trojan published the source code of his creation. He most probably did so to restore his reputation on a number of hacker forums:Read More →
Wikileaks revealed that CIA contractor Raytheon Blackbird Technologies was tasked to analyze advanced malware and TTPs used by threat actors in the wild. Wikileaks continues to publish documents from Vault 7Read More →
Because Windows executables haven’t wreaked enough damage on Windows computers, now you can use malformed MSI files to run malicious code on Linux systems. This scenario is possible because ofRead More →