hackers
Explore the anonymous world of criminal hackers, hacktivists and playful attention-seekers.
AMD Releases Critical Patch for CPU Vulnerability Discovered by Google
In a critical development for the tech industry, AMD has released security patches addressing a significant microprocessor vulnerability that was discovered by Google security researchers. This vulnerability, tracked as CVE-2024–56161 with a CVSS score of 7.2, exposes potential risks to Secure Encrypted Virtualization (SEV) protections, raising concerns among cybersecurity professionals and enterprises relying on AMD's hardware for confidential computing.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Casio UK Website Hit by Web Skimmer in Cyberattack
A recent cybersecurity incident has impacted Casio UK’s website, where a sophisticated web skimmer was discovered infecting the site. This malicious activity affected all pages of the website except for the typical checkout page, marking an unusual strategy by the threat actors involved. The infection was active from January 14 to January 24, 2025, and was promptly removed after detection.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
DeepSeek AI Tools Impersonated by Infostealer Malware on PyPI
The cybersecurity landscape continues to evolve, with threat actors constantly seeking new methods to exploit vulnerabilities. A recent campaign has highlighted how malicious actors are capitalizing on the growing popularity of artificial intelligence (AI) tools to spread infostealer malware. This time, the Python Package Index (PyPI) was the battleground, where attackers impersonated legitimate developer tools for DeepSeek AI, a Chinese artificial intelligence startup known for its R1 large-language model.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
XE Gang Moves from Credit Card Skimming to Zero-Day Exploits
The notorious Vietnamese cybercrime gang known as XE Group has shifted its malicious activities from credit card skimming to the exploitation of at least two zero-day vulnerabilities in widely deployed enterprise software products. This alarming transformation marks a significant evolution in their tactics, signaling a broader threat to enterprise security worldwide.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
2 Arrested in Crackdown on Nulled and Cracked Hacking Forums
In a significant law enforcement operation, two individuals were arrested, and one alleged administrator was charged in the takedown of the infamous Nulled and Cracked cybercrime forums. These online platforms, which were notorious for enabling illegal activities such as the trafficking of stolen credentials, hacking tools, and illicit hosting services, were targeted as part of a broader crackdown on cybercriminal activity. The operation, named Operation Talent, saw the cooperation of several law enforcement agencies across the globe.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Apple iPhone USB-C Security Breach
Over the past few weeks, Apple users have found themselves facing a series of worrying security concerns. From credential-stealing attacks affecting millions of macOS users to a sudden rise in iOS-targeted hacking attempts, it’s been a challenging time for those invested in Apple’s ecosystem. However, the most recent discovery may leave iPhone users particularly vulnerable: security researchers have successfully hacked the iPhone’s USB-C controller, exploiting a flaw in the system that could allow attackers to bypass Apple’s security protections.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Time Magazine’s X Account Hacked to Promote Fake Solana Token
A shocking cybersecurity breach, the official X account of Time Magazine, the iconic red-framed publication known globally for its journalistic integrity, was hacked earlier this Thursday. The attackers used the compromised account to promote a fraudulent Solana-based cryptocurrency token, duping unsuspecting followers and causing a brief surge in the fake token’s price.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Texas Governor Orders Ban on DeepSeek, RedNote for Government Devices
In a decisive move to protect critical infrastructure and national security, Texas Republican Governor Greg Abbott has issued a ban on several Chinese-owned apps for government-issued devices. This includes the popular AI platform DeepSeek, social media apps Xiaohongshu (RedNote), and Lemon8. Governor Abbott’s action marks the first state-level ban of its kind, sending a clear message that Texas will not tolerate data-harvesting tools from foreign adversaries, particularly those linked to the Chinese Communist Party (CCP).
By WIRE TOR - Ethical Hacking Services12 months ago in 01
KuCoin to Pay Nearly $300 Million in Penalties After Guilty Plea
In a significant development, KuCoin’s operator, PEKEN Global Limited, has agreed to pay nearly $300 million in penalties after pleading guilty to operating an unlicensed money-transmitting business. The cryptocurrency exchange, one of the largest in the world, was charged by U.S. authorities for failing to comply with critical regulatory requirements, which allowed cybercriminals to use the platform for illicit activities such as money laundering.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Hackers Exploit Gemini AI to Enhance Cyberattacks
In a startling revelation, Google’s Threat Intelligence Group (GTIG) has uncovered a disturbing trend in which hackers, including state-sponsored threat actors, are leveraging the Gemini AI assistant to boost their attack operations. While the AI-powered Gemini assistant was developed to improve productivity and support legitimate use cases, Google has discovered that it is increasingly being repurposed by cybercriminals and advanced persistent threat (APT) groups for nefarious activities such as reconnaissance, vulnerability research, and post-compromise actions.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Globe Life Data Breach May Impact an Additional 850,000 Clients
The breach was initially discovered during a routine security review of the company’s network on June 13, 2024. Globe Life found that hackers had accessed one of its web portals without authorization. This led to an immediate internal investigation, and the company began collaborating with external cybersecurity experts to assess the scope of the attack.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Mizuno USA Data Breach: Hackers Had Access for Two Months
Mizuno USA, a subsidiary of the Mizuno Corporation and one of the world’s leading sporting goods manufacturers, recently confirmed a data breach that saw unknown attackers gain unauthorized access to its network for over two months. The company revealed in data breach notification letters that sensitive files were stolen from its systems between August and October 2024.
By WIRE TOR - Ethical Hacking Services12 months ago in 01











