HackMag
# Hacker Magazines & Publications

Official Website HackMag

HackMag publishes high-quality translated content about information security, cyber security, hacking, malware and devops.


29 May

More than 60 malicious NPM packages are stealing user data

Socket’s Threat Research Team discovered an active campaign involving dozens of malicious npm packages that collect and leak information from victims’ systems. Over the past two weeks, unknown cybercriminals have published 60 malicious packages under three npm accounts: (…)


28 May

MathWorks affected by ransomware attack

MathWorks, Inc., an American corporation specializing in mathematical computing software, was affected by a ransomware attack resulting in service interruptions. Founded in 1984, MathWorks is headquartered in Massachusetts and has more than 34 offices worldwide with more than (…)


27 May

Bring Your Own Vulnerable Driver! Meet BYOVD – one of the most dangerous attacks targeting Windows systems

Many notorious hacker groups (e.g. North Korea’s Lazarus) use the BYOVD attack to gain access to kernel space and implement complex advanced persistent threats (APTs). The same technique is employed by the creators of the Terminator tool and various encryptor operators. This (…)


26 May

Packages intentionally destroying data discovered in NPM

Socket experts discovered in npm (node package manager) eight malicious packages that were downloaded from the repository more than 6,200 times over the last two years. All these packages could destroy data on users’ workstations. The malicious packages used typosquatting to (…)


23 May

Chrome will change compromised user passwords automatically

Google developers announced a new feature in the Chrome browser enabling its built-in password manager to change compromised credentials automatically. “When Chrome detects a compromised password during sign in, Google Password Manager prompts the user with an option to fix (…)


23 May

Chinese hackers use zero-day vulnerability in Trimble Cityworks to attack US Government networks

According to Cisco Talos, Chinese-speaking threat actors used a zero-day vulnerability in the Trimble Cityworks software to attack local governing bodies across the United States. Trimble Cityworks is a GIS-centric asset lifecycle management system used by local authorities, (…)


22 May

More than 100 dual-function Chrome extensions hijack sessions and steal user credentials

According to DomainTools Intelligence (DTI), more than 100 malicious Chrome browser extensions disguised as VPN services, AI assistants, crypto utilities, etc. are used to steal cookies and covertly execute remote scripts. Unknown cybercriminals have been have been (…)


21 May

IP cameras in pentesting. Improper use of security cameras

In the course of a pentesting audit, you can capture an image from a security camera and attach it to your report – just to please the customer. No doubt, such pictures are impressive, but what can be the real impact of attacks targeting cameras? Today I will show how to run (…)


20 May

Defendnot utility disables Microsoft Defender in Windows

A new tool called Defendnot can disable Microsoft Defender protection on Windows devices even if no real antiviruses are installed in the system. Defendnot has been developed by an IT researcher known as Arsenii es3n1n. The utility abuses an undocumented WSC API by (…)


19 May

Malware contained in NPM hides itself using Unicode-based steganography

A malicious package discovered in npm (node package manager) hides its code using invisible Unicode characters and uses Google Calendar links for communication with its C&C servers. According to Veracode, since the beginning of May, the malicious os-info-checker-es6 (…)

You Can’t Arrest An Idea

Cybercrime Magazine

Next-Gen Security Awareness Training Series On The Cybercrime Magazine Podcast

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Aug. 27, 2025 – Watch the Video “We’re very excited to be launching a (…)

27 August

The Proton Blog

Google suffers data breach, puts out Gmail warning

Google has warned Workspace users that they should change to passkeys after a surge in phishing attacks. Learn more and what you can do.

26 August

The Hacker News

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the (…)

25 August

Tor Project

New Release: Tails 6.19

Changes and updates Update Tor Browser to 14.5.6. Update the Tor client to 0.4.8.17. Update Thunderbird to 128.13.0. Fixed problems Remove irrelevant (…)

21 August

Red Cross

We stand with Ukraine

The Russian government’s attack on Ukraine has put millions of innocent lives in danger. We stand with Ukraine to support their freedom and to defend democracy. If you wish to support Ukraine and its people in their time of need, please consider donating to the Red Cross.

Your data is YOUR data

eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Signal

Signal

Speak Freely

Tor Browser

Tor Browser

Tor protects your privacy

NordVPN

Protect all your devices.

Secure, high-speed VPN