hackers
Explore the anonymous world of criminal hackers, hacktivists and playful attention-seekers.
Texas Governor Orders Ban on DeepSeek, RedNote for Government Devices
In a decisive move to protect critical infrastructure and national security, Texas Republican Governor Greg Abbott has issued a ban on several Chinese-owned apps for government-issued devices. This includes the popular AI platform DeepSeek, social media apps Xiaohongshu (RedNote), and Lemon8. Governor Abbott’s action marks the first state-level ban of its kind, sending a clear message that Texas will not tolerate data-harvesting tools from foreign adversaries, particularly those linked to the Chinese Communist Party (CCP).
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
KuCoin to Pay Nearly $300 Million in Penalties After Guilty Plea
In a significant development, KuCoin’s operator, PEKEN Global Limited, has agreed to pay nearly $300 million in penalties after pleading guilty to operating an unlicensed money-transmitting business. The cryptocurrency exchange, one of the largest in the world, was charged by U.S. authorities for failing to comply with critical regulatory requirements, which allowed cybercriminals to use the platform for illicit activities such as money laundering.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Hackers Exploit Gemini AI to Enhance Cyberattacks
In a startling revelation, Google’s Threat Intelligence Group (GTIG) has uncovered a disturbing trend in which hackers, including state-sponsored threat actors, are leveraging the Gemini AI assistant to boost their attack operations. While the AI-powered Gemini assistant was developed to improve productivity and support legitimate use cases, Google has discovered that it is increasingly being repurposed by cybercriminals and advanced persistent threat (APT) groups for nefarious activities such as reconnaissance, vulnerability research, and post-compromise actions.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Globe Life Data Breach May Impact an Additional 850,000 Clients
The breach was initially discovered during a routine security review of the company’s network on June 13, 2024. Globe Life found that hackers had accessed one of its web portals without authorization. This led to an immediate internal investigation, and the company began collaborating with external cybersecurity experts to assess the scope of the attack.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Mizuno USA Data Breach: Hackers Had Access for Two Months
Mizuno USA, a subsidiary of the Mizuno Corporation and one of the world’s leading sporting goods manufacturers, recently confirmed a data breach that saw unknown attackers gain unauthorized access to its network for over two months. The company revealed in data breach notification letters that sensitive files were stolen from its systems between August and October 2024.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Google Blocks 2.36 Million Risky Android Apps from Play Store in 2024
Google blocked 2.36 million Android app submissions to the Play Store in 2024 due to violations of its policies that made them potentially risky for users. In addition, 158,000 developer accounts were banned for attempting to publish harmful apps like malware and spyware on Android’s official app store. In comparison, Google blocked 2,280,000 risky apps in 2023 and 1,500,000 apps in 2022, while the figures for blocked Play developer accounts were 333,000 and 173,000, respectively. The increasing trend highlights the persistent threat posed by malicious actors and the need for continuous improvements in security measures.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
New Syncjacking Attack Hijacks Devices Using Chrome Extensions
A new cyberattack method called ‘Browser Syncjacking’ has emerged, demonstrating how hackers can hijack devices through seemingly benign Chrome extensions. Discovered by security researchers at SquareX, this attack involves a multi-stage process that begins with Google profile hijacking, progresses to browser hijacking, and ultimately results in complete device takeover.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Ransomware Attack Disrupts New York Blood Donation Giant
Cyberattack Forces Appointment Rescheduling and Raises Concerns Over Data Security The New York Blood Center (NYBC), one of the largest independent blood collection and distribution organizations in the world, has fallen victim to a ransomware attack. The cyberattack, which was detected on Sunday, January 26, has forced the organization to reschedule some donor appointments and disrupted its daily operations.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Police Seizes Cracked and Nulled Hacking Forum Servers, Arrests Suspects
In a coordinated international operation, Europol and German law enforcement confirmed the arrest of two individuals and the seizure of 17 servers from two notorious hacking forums: Cracked and Nulled. These forums, known for hosting millions of cybercriminals and hackers, were taken down as part of Operation Talent, a joint law enforcement effort aimed at disrupting the underground cybercrime economy.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
DeepSeek Under Fire
Australia’s science minister, Ed Husic, has become the first big shot in a Western government to raise red flags about DeepSeek, the Chinese chatbot that’s been shaking up markets and the tech world. It’s no secret that Chinese tech companies, from Huawei to TikTok, have been under the microscope for years, with folks worrying they might be tied to the Chinese government and could be scooping up people’s data for intelligence purposes.
By Shimshon Holzmanabout a year ago in 01
Hackers exploiting flaws in SimpleHelp RMM to breach networks
Hackers are actively exploiting vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) software, gaining unauthorized access to networks and posing significant security risks. These security flaws, identified as CVE202457726 CVE202457727 and CVE202457728 enable attackers to download and upload files on target devices, escalate privileges to administrative levels, and potentially deploy further malicious payloads.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01











