hackers
Explore the anonymous world of criminal hackers, hacktivists and playful attention-seekers.
Demystifying the Dark Web. AI-Generated.
The internet is a vast and multifaceted entity, with layers extending beyond the familiar surface web that most users interact with daily. One such lesser-known domain is the Dark Web, often shrouded in mystery and subject to widespread misconceptions. While the media frequently portrays it as a hotbed for illicit activity, the reality is more nuanced and deserves closer examination. This article aims to demystify the Dark Web by exploring its functions, legitimate uses, and the risks associated with its exploration, providing a clearer perspective on its role within the broader internet ecosystem.
By Gustavo Woltmannabout a year ago in 01
2.8 Million IPs Power Large-Scale Attack on VPN and Security Devices
A large-scale brute force password attack using almost 2.8 million IP addresses is currently underway, targeting a wide range of networking devices, including those from Palo Alto Networks, Ivanti, and SonicWall. This sophisticated attack has been ongoing since last month, with cybercriminals attempting to compromise critical security infrastructure.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
HPE Notifies Employees of Data Breach After Russian Office 365 Hack
Hewlett Packard Enterprise (HPE) is notifying employees about a data breach that resulted from a cyberattack on the company’s Office 365 email environment by Russian state-sponsored hackers. The attack, which occurred in May 2023, compromised sensitive personal and financial data of some employees.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Hackers Exploit Cityworks RCE Bug to Breach Microsoft IIS Servers
Overview of the Cityworks Vulnerability Software vendor Trimble has issued a security warning regarding active exploitation of a deserialization vulnerability in Cityworks, which is being used by hackers to execute remote commands on Microsoft IIS servers. Threat actors leveraging this flaw have been observed deploying Cobalt Strike beacons, a well-known penetration testing tool frequently repurposed by cybercriminals for persistent network access.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Cloudflare Outage Disrupts Multiple Services Due to Phishing Block Mishap
A widespread Cloudflare outage occurred due to an error in blocking a phishing URL on the company's R2 object storage platform, causing disruptions across multiple services for nearly an hour.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Massive Data Breach Hits Healthcare Organizations in New York and Pennsylvania
The personal and health information of over 430,000 individuals was compromised in October and November 2024 data breaches at Allegheny Health Network (AHN) and University Diagnostic Medical Imaging (UDMI).
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Kimsuky Hackers Deploy Custom RDP Wrapper for Remote Access
The North Korean cyber-espionage group known as Kimsuky has been observed leveraging a custom-built RDP Wrapper alongside proxy tools to maintain direct access to infected machines in recent cyberattacks. This represents a strategic shift in Kimsuky's tactics, as reported in recent findings.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
DDoS Attacks Reportedly Behind DayZ and Arma Network Outages
An ongoing Distributed Denial of Service (DDoS) attack has been disrupting the online experiences of players for Bohemia Interactive’s popular titles, DayZ and Arma Reforger, preventing them from enjoying the games as they would normally. The cyberattack is reportedly targeting the Czech-based video game developer’s infrastructure, causing server connectivity issues that have left players unable to access the multiplayer components of the games. Since its onset last Friday, the DDoS attack has created a significant disturbance for players, who have been unable to connect to the servers.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Hackers Exploit SimpleHelp RMM Flaws to Deploy Sliver Malware
Cybercriminals have recently been targeting vulnerabilities in the SimpleHelp Remote Monitoring and Management (RMM) software to gain unauthorized access, deploy malware, and possibly pave the way for future ransomware attacks. The vulnerabilities in question are tracked as CVE-2024–57726, CVE-2024–57727, and CVE-2024–57728, which were reported last week by cybersecurity firm Arctic Wolf. While Arctic Wolf suggested these flaws may be actively exploited, it couldn’t conclusively confirm their active use. However, further investigation by cybersecurity firm Field Effect has confirmed that the vulnerabilities are being actively exploited, providing more insight into the post-exploitation activity of threat actors.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Critical RCE Bug in Microsoft Outlook Now Exploited in Attacks
A critical remote code execution (RCE) vulnerability in Microsoft Outlook is now being actively exploited in the wild, prompting urgent warnings from cybersecurity authorities, including the U.S. Cybersecurity and Infrastructure Security Agency (CISA).
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Netgear Warns of Zero-Day Vulnerabilities in WiFi Routers
Netgear, a leading American computer networking company, has issued an urgent security advisory regarding two critical vulnerabilities that impact several of their WiFi router models. These vulnerabilities expose users to significant security risks, and Netgear has strongly recommended that customers update their devices with the latest firmware as soon as possible to mitigate potential exploitation. This warning comes amid growing concerns over cybersecurity, as cyberattacks targeting network equipment, such as routers, have been on the rise in recent years.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Chinese Cyberspies Use New SSH Backdoor in Network Device Hacks
A newly discovered cyber-espionage campaign has revealed that a Chinese hacking group, identified as Evasive Panda (also known as DaggerFly), is leveraging a sophisticated SSH backdoor to infiltrate network appliances. This campaign, active since mid-November 2024, highlights the advanced capabilities of Chinese cyber operatives and their focus on persistent, covert operations. The implications of such attacks stretch beyond individual organizations, posing risks to national security, critical infrastructure, and global supply chains.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01











