cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
Hackers Exploit Windows RID Hijacking to Create Hidden Admin Accounts
Hackers are utilizing a stealthy technique known as Relative Identifier (RID) hijacking to turn low-privileged Windows accounts into hidden administrator accounts. This method, recently linked to a North Korean hacking group, enables attackers to gain elevated access on compromised systems while evading detection.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Zyxel Warns of Critical Firewall Issues Due to Faulty Update
Zyxel has issued an urgent advisory regarding a problematic security signature update that is causing significant disruptions to its USG FLEX and ATP Series firewalls. The affected devices are experiencing critical failures, including boot loops, ZySH daemon crashes, and login access issues. Administrators are now being urged to take immediate action to resolve the issue.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
PayPal Agrees to $2 Million Settlement Over 2022 Data Breach
In a significant development for cybersecurity compliance, New York State announced a $2 million settlement with PayPal for failing to meet the state's stringent cybersecurity regulations, which contributed to a data breach in December 2022. The breach exposed sensitive information belonging to tens of thousands of customers, underscoring the importance of robust security measures in safeguarding digital platforms.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
5 Common Cryptocurrency Scams and How to Avoid Them
The world of cryptocurrency is exciting, full of potential, and a playground for innovation. But with great opportunity comes great risk. As the popularity of crypto grows, so does the number of scams designed to exploit newcomers and seasoned investors alike.
By Jay Phoenixabout a year ago in 01
Hacker Infects 18,000 "Script Kiddies" with Fake Malware Builder
A hacker has successfully targeted low-skilled hackers, commonly referred to as "script kiddies" by spreading a fake malware builder that secretly installed a backdoor to compromise their devices. This operation, aimed at exploiting the lack of experience among novice cybercriminals, has infected over 18,000 devices worldwide.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Subaru Starlink Flaw Allowed Hackers to Hijack Cars
A critical security vulnerability was discovered in Subaru's Starlink connected car service, exposing millions of vehicles in the United States, Canada, and Japan to potential cyberattacks. Security researchers Sam Curry and Shubham Shah identified the flaw on November 20, 2024, which allowed attackers to remotely control and track vehicles using only a license plate.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Hundreds of Fake Reddit Sites Push Lumma Stealer Malware
Cybercriminals are ramping up their efforts, using sophisticated tactics to distribute Lumma Stealer malware. These malicious campaigns leverage nearly 1,000 fraudulent websites mimicking trusted platforms like Reddit and the popular WeTransfer file-sharing service. The attackers' goal is clear: to deceive users into downloading the Lumma Stealer malware, which is a potent info-stealing threat.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Tesla EV Charger Hacked Twice on Second Day of Pwn2Own Tokyo
The second day of the Pwn2Own Automotive 2025 hacking contest brought groundbreaking achievements in automotive security as Tesla’s Wall Connector electric vehicle (EV) charger was successfully hacked twice. Security researchers also demonstrated vulnerabilities in various EV chargers, in-vehicle infotainment (IVI) systems, and automotive technologies, exploiting a total of 23 zero-day vulnerabilities.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01











