
WIRE TOR - Ethical Hacking Services
Bio
WIRE TOR is a Cyber Intelligence Company that Provides Pentest & Cybersecurity News About IT, Web, Mobile (iOS, Android), API, Cloud, IoT, Network, Application, System, Red teaming, Social Engineering, Wireless, And Source Code.
Stories (108)
Filter by community
Australian Fertility Services Giant Genea Hit by Security Breach
One of Australia’s largest fertility service providers, Genea, has confirmed a security breach after detecting suspicious activity on its network. The company revealed that unknown attackers had gained unauthorized access to its systems, prompting an urgent investigation to determine the extent of the breach and its potential impact on patients.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Microsoft App-V Tool Becomes New Weapon for Chinese Hackers to Avoid Detection
Introduction Cybersecurity researchers have recently uncovered a sophisticated cyber-espionage campaign conducted by the Chinese Advanced Persistent Threat (APT) group known as Mustang Panda. The group has been found leveraging Microsoft Application Virtualization Injector (MAVInject.exe) as a Living-Off-the-Land Binary (LOLBIN) to stealthily inject malicious payloads into legitimate processes, thereby bypassing antivirus detection mechanisms. This evasion technique was uncovered by security analysts at Trend Micro, who have tracked this threat actor under the codename “Earth Preta.”
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Hackers Target Insight Partners in Latest High-Profile Cyberattack
Introduction New York-based venture capital and private equity firm Insight Partners recently disclosed that it suffered a cybersecurity breach in January 2025 following a sophisticated social engineering attack. The firm, which manages over $90 billion in regulatory assets and has invested in more than 800 software and technology companies worldwide, confirmed the incident in a public statement issued on Tuesday.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
MiTM and DoS Attacks Enabled by Critical Flaws in OpenSSH
Introduction OpenSSH has recently released security updates to address two critical vulnerabilities that expose SSH servers to machine-in-the-middle (MiTM) and denial-of-service (DoS) attacks. One of these vulnerabilities has remained undiscovered for over a decade. The security research team at Qualys identified and reported these issues to OpenSSH maintainers, demonstrating their potential exploitability.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
X Platform Blocks Signal Contact Links, Labels Them as Malicious
Introduction Social media platform X (formerly known as Twitter) has started blocking links to "Signal.me," a URL used by the Signal encrypted messaging app to share account details. This unexpected move has raised concerns among privacy advocates, journalists, and users of the secure messaging service. The platform now flags these links as malicious, preventing users from posting them in public posts, direct messages, or even profile bios.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
South Korea Takes Action: DeepSeek AI App Downloads Paused Over Privacy Risks
Introduction DeepSeek, a Chinese artificial intelligence startup, has temporarily halted downloads of its chatbot applications in South Korea due to privacy concerns raised by local authorities. The move follows an investigation by South Korea's Personal Information Protection Commission, which identified issues related to data transparency and the handling of personal information. This development reflects a broader global conversation about data privacy, AI ethics, and the responsibilities of AI-driven platforms in safeguarding user data.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Microsoft Sounds Alarm on macOS Malware Stealing Crypto Assets
Introduction A new and more advanced variant of the XCSSET macOS modular malware has surfaced, marking a significant development in its evolution. This malware, which primarily targets Apple users, has been active for at least five years. The latest improvements indicate a renewed focus on enhancing its capabilities for data theft, particularly targeting sensitive information such as digital wallets and data from the Notes application.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Windows Zero-Day Exploited by Chinese Hackers
A newly discovered Windows zero-day vulnerability is being actively exploited by the Chinese Advanced Persistent Threat (APT) group Mustang Panda, according to recent findings by cybersecurity researchers.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
whoAMI Attack Exploits AWS AMI Naming Flaw for RCE
Cybersecurity researchers have uncovered a new type of name confusion attack called whoAMI, which enables threat actors to execute remote code within Amazon Web Services (AWS) accounts by exploiting vulnerabilities in the way Amazon Machine Images (AMI) are retrieved.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Outlook Mail Service Hijacked by FinalDraft Malware for Covert Communications
A newly discovered malware named FinalDraft is leveraging Outlook email drafts for covert command-and-control (C2) communication. The malware has been identified in attacks against a ministry in a South American country. Security researchers at Elastic Security Labs uncovered this sophisticated attack, which involves a complex toolset, including a custom malware loader named PathLoader, the FinalDraft backdoor, and multiple post-exploitation utilities.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Palo Alto Networks PAN-OS Under Attack: Authentication Bypass Exploited
Introduction A high-severity vulnerability (CVE-2025-0108) in Palo Alto Networks PAN-OS is actively being exploited by hackers to bypass authentication mechanisms. This security flaw, affecting the PAN-OS management web interface, allows unauthorized attackers on the network to invoke PHP scripts without authentication. If exploited, this vulnerability could lead to the compromise of firewall integrity and confidentiality, posing a significant risk to affected organizations.
By WIRE TOR - Ethical Hacking Services11 months ago in 01
Hackers Exploit Device Codes to Breach Microsoft Email Accounts
Introduction A new and active cyberattack campaign has been uncovered, targeting Microsoft 365 accounts through device code phishing. This campaign, attributed to a threat actor potentially linked to Russia, is affecting high-profile individuals across multiple sectors, including government, NGOs, IT services, defense, telecommunications, healthcare, and energy industries in Europe, North America, Africa, and the Middle East.
By WIRE TOR - Ethical Hacking Services11 months ago in 01











