HackMag publishes high-quality translated content about information security, cyber security, hacking, malware and devops.
More than 60 malicious NPM packages are stealing user data
Socket’s Threat Research Team discovered an active campaign involving dozens of malicious npm packages that collect and leak information from victims’ systems. Over the past two weeks, unknown cybercriminals have published 60 malicious packages under three npm accounts: (…)
MathWorks affected by ransomware attack
MathWorks, Inc., an American corporation specializing in mathematical computing software, was affected by a ransomware attack resulting in service interruptions. Founded in 1984, MathWorks is headquartered in Massachusetts and has more than 34 offices worldwide with more than (…)
Many notorious hacker groups (e.g. North Korea’s Lazarus) use the BYOVD attack to gain access to kernel space and implement complex advanced persistent threats (APTs). The same technique is employed by the creators of the Terminator tool and various encryptor operators. This (…)
Packages intentionally destroying data discovered in NPM
Socket experts discovered in npm (node package manager) eight malicious packages that were downloaded from the repository more than 6,200 times over the last two years. All these packages could destroy data on users’ workstations. The malicious packages used typosquatting to (…)
Chrome will change compromised user passwords automatically
Google developers announced a new feature in the Chrome browser enabling its built-in password manager to change compromised credentials automatically. “When Chrome detects a compromised password during sign in, Google Password Manager prompts the user with an option to fix (…)
Chinese hackers use zero-day vulnerability in Trimble Cityworks to attack US Government networks
According to Cisco Talos, Chinese-speaking threat actors used a zero-day vulnerability in the Trimble Cityworks software to attack local governing bodies across the United States. Trimble Cityworks is a GIS-centric asset lifecycle management system used by local authorities, (…)
More than 100 dual-function Chrome extensions hijack sessions and steal user credentials
According to DomainTools Intelligence (DTI), more than 100 malicious Chrome browser extensions disguised as VPN services, AI assistants, crypto utilities, etc. are used to steal cookies and covertly execute remote scripts. Unknown cybercriminals have been have been (…)
IP cameras in pentesting. Improper use of security cameras
In the course of a pentesting audit, you can capture an image from a security camera and attach it to your report – just to please the customer. No doubt, such pictures are impressive, but what can be the real impact of attacks targeting cameras? Today I will show how to run (…)
Defendnot utility disables Microsoft Defender in Windows
A new tool called Defendnot can disable Microsoft Defender protection on Windows devices even if no real antiviruses are installed in the system. Defendnot has been developed by an IT researcher known as Arsenii es3n1n. The utility abuses an undocumented WSC API by (…)
Malware contained in NPM hides itself using Unicode-based steganography
A malicious package discovered in npm (node package manager) hides its code using invisible Unicode characters and uses Google Calendar links for communication with its C&C servers. According to Veracode, since the beginning of May, the malicious os-info-checker-es6 (…)
CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet by embedding malicious (…)
4 October
New Study Warns Several Free iOS and Android VPN Apps Leak Data
A Zimperium zLabs analysis of 800 free Android and iOS VPN apps exposes critical security flaws, including the Heartbleed bug, excessive system permissions, (…)
4 October
How to get to inbox zero: Privacy-first inbox organization tips
The inbox zero method still works. Here's how to organize your inbox, simplify your workflow, and free up time for your most important tasks.
1 October
Qubes OS Summit 2025: videos and slides
Qubes OS Summit 2025 has concluded! Thank you to our sponsors, presenters, attendees, and organizers for making this year’s summit a success! If you missed (…)
30 September