
WIRE TOR - Ethical Hacking Services
Bio
WIRE TOR is a Cyber Intelligence Company that Provides Pentest & Cybersecurity News About IT, Web, Mobile (iOS, Android), API, Cloud, IoT, Network, Application, System, Red teaming, Social Engineering, Wireless, And Source Code.
Stories (108)
Filter by community
XE Gang Moves from Credit Card Skimming to Zero-Day Exploits
The notorious Vietnamese cybercrime gang known as XE Group has shifted its malicious activities from credit card skimming to the exploitation of at least two zero-day vulnerabilities in widely deployed enterprise software products. This alarming transformation marks a significant evolution in their tactics, signaling a broader threat to enterprise security worldwide.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
2 Arrested in Crackdown on Nulled and Cracked Hacking Forums
In a significant law enforcement operation, two individuals were arrested, and one alleged administrator was charged in the takedown of the infamous Nulled and Cracked cybercrime forums. These online platforms, which were notorious for enabling illegal activities such as the trafficking of stolen credentials, hacking tools, and illicit hosting services, were targeted as part of a broader crackdown on cybercriminal activity. The operation, named Operation Talent, saw the cooperation of several law enforcement agencies across the globe.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Apple iPhone USB-C Security Breach
Over the past few weeks, Apple users have found themselves facing a series of worrying security concerns. From credential-stealing attacks affecting millions of macOS users to a sudden rise in iOS-targeted hacking attempts, it’s been a challenging time for those invested in Apple’s ecosystem. However, the most recent discovery may leave iPhone users particularly vulnerable: security researchers have successfully hacked the iPhone’s USB-C controller, exploiting a flaw in the system that could allow attackers to bypass Apple’s security protections.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Time Magazine’s X Account Hacked to Promote Fake Solana Token
A shocking cybersecurity breach, the official X account of Time Magazine, the iconic red-framed publication known globally for its journalistic integrity, was hacked earlier this Thursday. The attackers used the compromised account to promote a fraudulent Solana-based cryptocurrency token, duping unsuspecting followers and causing a brief surge in the fake token’s price.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Texas Governor Orders Ban on DeepSeek, RedNote for Government Devices
In a decisive move to protect critical infrastructure and national security, Texas Republican Governor Greg Abbott has issued a ban on several Chinese-owned apps for government-issued devices. This includes the popular AI platform DeepSeek, social media apps Xiaohongshu (RedNote), and Lemon8. Governor Abbott’s action marks the first state-level ban of its kind, sending a clear message that Texas will not tolerate data-harvesting tools from foreign adversaries, particularly those linked to the Chinese Communist Party (CCP).
By WIRE TOR - Ethical Hacking Services12 months ago in 01
KuCoin to Pay Nearly $300 Million in Penalties After Guilty Plea
In a significant development, KuCoin’s operator, PEKEN Global Limited, has agreed to pay nearly $300 million in penalties after pleading guilty to operating an unlicensed money-transmitting business. The cryptocurrency exchange, one of the largest in the world, was charged by U.S. authorities for failing to comply with critical regulatory requirements, which allowed cybercriminals to use the platform for illicit activities such as money laundering.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Hackers Exploit Gemini AI to Enhance Cyberattacks
In a startling revelation, Google’s Threat Intelligence Group (GTIG) has uncovered a disturbing trend in which hackers, including state-sponsored threat actors, are leveraging the Gemini AI assistant to boost their attack operations. While the AI-powered Gemini assistant was developed to improve productivity and support legitimate use cases, Google has discovered that it is increasingly being repurposed by cybercriminals and advanced persistent threat (APT) groups for nefarious activities such as reconnaissance, vulnerability research, and post-compromise actions.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Globe Life Data Breach May Impact an Additional 850,000 Clients
The breach was initially discovered during a routine security review of the company’s network on June 13, 2024. Globe Life found that hackers had accessed one of its web portals without authorization. This led to an immediate internal investigation, and the company began collaborating with external cybersecurity experts to assess the scope of the attack.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Mizuno USA Data Breach: Hackers Had Access for Two Months
Mizuno USA, a subsidiary of the Mizuno Corporation and one of the world’s leading sporting goods manufacturers, recently confirmed a data breach that saw unknown attackers gain unauthorized access to its network for over two months. The company revealed in data breach notification letters that sensitive files were stolen from its systems between August and October 2024.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Google Blocks 2.36 Million Risky Android Apps from Play Store in 2024
Google blocked 2.36 million Android app submissions to the Play Store in 2024 due to violations of its policies that made them potentially risky for users. In addition, 158,000 developer accounts were banned for attempting to publish harmful apps like malware and spyware on Android’s official app store. In comparison, Google blocked 2,280,000 risky apps in 2023 and 1,500,000 apps in 2022, while the figures for blocked Play developer accounts were 333,000 and 173,000, respectively. The increasing trend highlights the persistent threat posed by malicious actors and the need for continuous improvements in security measures.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
New Syncjacking Attack Hijacks Devices Using Chrome Extensions
A new cyberattack method called ‘Browser Syncjacking’ has emerged, demonstrating how hackers can hijack devices through seemingly benign Chrome extensions. Discovered by security researchers at SquareX, this attack involves a multi-stage process that begins with Google profile hijacking, progresses to browser hijacking, and ultimately results in complete device takeover.
By WIRE TOR - Ethical Hacking Services12 months ago in 01
Ransomware Attack Disrupts New York Blood Donation Giant
Cyberattack Forces Appointment Rescheduling and Raises Concerns Over Data Security The New York Blood Center (NYBC), one of the largest independent blood collection and distribution organizations in the world, has fallen victim to a ransomware attack. The cyberattack, which was detected on Sunday, January 26, has forced the organization to reschedule some donor appointments and disrupted its daily operations.
By WIRE TOR - Ethical Hacking Services12 months ago in 01











