❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 5 December 2025Main stream
Before yesterdayMain stream

Lummis Bitcoin meme on X fuels talk of U.S. Strategic BTC Reserve

4 December 2025 at 04:40
Cynthia Lummis’ Bitcoin meme post on X revives speculation that the U.S. could expand BTC reserves under Trump’s Strategic Bitcoin Reserve framework. U.S. Senator Cynthia Lummis posted a Bitcoin-themed image on social media platform X, prompting speculation that the United…

Balancer to repay liquidity providers $8M in recovered funds after $128M v2 exploit

27 November 2025 at 22:26
A new proposal on Balancer’s governance forum sets the stage for how the protocol plans to handle the next phase of its recovery effort. Balancer has outlined a reimbursement plan that would return roughly $8 million in rescued assets to…

HashJack: A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers

By: Varshini
26 November 2025 at 05:46

Security researchers at Cato CTRL have uncovered HashJack. This innovative indirect prompt-injection attack hides harmful commands in the fragment portion of URLs after the β€œ#” symbol. This technique turns trusted websites into weapons against AI browser assistants like Perplexity’s Comet, Microsoft’s Copilot in Edge, and Google’s Gemini in Chrome. How The Attack Unfolds HashJack exploits […]

The post HashJack: A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

DogCat – Exploiting LFI and Docker Privilege Escalation -TryHackMe Walkthrough

By: Jo
21 September 2024 at 11:45
In this walkthrough, we’ll explore the Dogcat room on TryHackMe, a box that features a Local File Inclusion (LFI) vulnerability and Docker privilege escalation. LFI allows us to read sensitive files from the system and eventually gain access to the server.There are a total of 4 flags in this machine which we need to find. […]

Prime: 1 – Walkthrough for OSCP Series

By: Jo
11 June 2023 at 12:05
Prime: 1 is a challenging boot2root machine created by Suraj Pandey. It is designed for those who are preparing for the OSCP exam and is a great way to practice your penetration testing skills. In this blog post, I will walk you through the steps I took to root the machine, including: Performing a port […]

digital world.local: Vengeance Walkthrough – OSCP Way

By: Jo
8 October 2022 at 13:13
Vengeance is one of the digital world.local series which makes vulnerable boxes closer to OSCP labs. This box has a lot of services and there could be multiple ways to exploit this, Below is what I have tried. Lab requirement: 1. Kali VM 2. Download Vengeance: https://www.vulnhub.com/entry/digitalworldlocal-vengeance,704 3. Some patience. I have written article already […]

The Binary Exploitation: Stack based Buffer overflow

By: Jo
19 March 2022 at 11:38
This article talks about cracking Level 13 Binary of Cyberstart CTF. The hint that was given for this challenge is β€œCyclic Pattern”, which means we need to use pattern finder tool to figure out the length of the buffer and then run the arbitrary function. Let’s crack this: Running the binary gives us this output: […]

Log4Shell Quick Lab Setup for Testing

By: Jo
10 January 2022 at 08:00
Last month, On December 09 2021, The release of a Remote Code Execution POC over twitter involving exploitation of Apache’s log4j2 logging class took everyone’s peace away. The attack was pretty simple and the fact that it can be easily exploited by anyone is what made this more terrifying. The first edition of this attack […]

Hackers exploit Sunlogin to execute the Sliver C2 framework

By: Ali Raza
4 February 2023 at 16:06

Hut 8 Mining Corp, a cryptocurrency mining company based in Canada, has announced a merger with US Bitcoin Corp. The two companies boards have also agreed to name the new company β€œHut 8 Corp” or β€œNew Hut.” Hut 8 announces merger with US Bitcoin The details of this merger agreement said that New Hut would … Continue reading Hackers exploit Sunlogin to execute the Sliver C2 framework

The post Hackers exploit Sunlogin to execute the Sliver C2 framework appeared first on KoDDoS Blog.

US government warns of DDoS campaigns targeting the US healthcare sector

By: Ali Raza
31 January 2023 at 05:03

The United States government and other key authorities have issued an alert over the increased number of distributed denial-of-service (DDoS) attacks conducted by Russian threat actor groups. These attacks targeted the healthcare sector and are attributed to the KillNet hacking group. Russian hackers launch DDoS campaigns targeting hospitals The KillNet hacking group is attributed to … Continue reading US government warns of DDoS campaigns targeting the US healthcare sector

The post US government warns of DDoS campaigns targeting the US healthcare sector appeared first on KoDDoS Blog.

digital world.local: Vengeance Walkthrough – OSCP Way

By: Jo
8 October 2022 at 13:13
Vengeance is one of the digital world.local series which makes vulnerable boxes closer to OSCP labs. This box has a lot of services and there could be multiple ways to exploit this, Below is what

Continue readingdigital world.local: Vengeance Walkthrough – OSCP Way

The Binary Exploitation: Stack based Buffer overflow

By: Jo
19 March 2022 at 11:38
This article talks about cracking Level 13 Binary of Cyberstart CTF. The hint that was given for this challenge is β€œCyclic Pattern”, which means we need to use pattern finder tool to figure out the

Continue readingThe Binary Exploitation: Stack based Buffer overflow

Log4Shell Quick Lab Setup for Testing

By: Jo
10 January 2022 at 08:00
Last month, On December 09 2021, The release of a Remote Code Execution POC over twitter involving exploitation of Apache’s log4j2 logging class took everyone’s peace away. The attack was pretty simple and the fact

Continue readingLog4Shell Quick Lab Setup for Testing

CVE-2019-19781: Citrix ADC RCE vulnerability

4 February 2020 at 05:46

A week before the 2019 holidays Citrix announced that an authentication bypass vulnerability was discovered in multiple Citrix products. The affected products are the Citrix Application Delivery Controller (formerly known as NetScaler AD), Citrix Gateway NetScaler ADC (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP appliance. Exploiting the vulnerability could allow an unauthenticated attacker [...]

The post CVE-2019-19781: Citrix ADC RCE vulnerability appeared first on Hacking Tutorials.

❌
❌