hackers
Explore the anonymous world of criminal hackers, hacktivists and playful attention-seekers.
Hackers exploiting flaws in SimpleHelp RMM to breach networks
Hackers are actively exploiting vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) software, gaining unauthorized access to networks and posing significant security risks. These security flaws, identified as CVE202457726 CVE202457727 and CVE202457728 enable attackers to download and upload files on target devices, escalate privileges to administrative levels, and potentially deploy further malicious payloads.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
New Apple CPU Side-Channel Attacks Steal Data from Browsers
A team of security researchers has uncovered new side-channel vulnerabilities in modern Apple processors, capable of stealing sensitive information from web browsers. The vulnerabilities, identified as FLOP and SLAP, highlight flaws in Apple’s speculative execution mechanisms, allowing attackers to extract private data remotely.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Garmin GPS Watches Crash and Enter Reboot Loop, Users Frustrated
Garmin users worldwide are experiencing significant issues with their GPS watches, as devices crash upon accessing GPS-reliant apps and subsequently become trapped in a reboot loop, displaying only a blue triangle logo.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
DeepSeek Suspends Registrations Following Massive Cyberattack
Chinese AI platform DeepSeek has temporarily suspended new user registrations for its DeepSeek-V3 chat platform, citing a “large-scale” cyberattack targeting its services. This disruption has raised concerns as the platform rapidly gained popularity over the past week, thanks to its advanced AI model.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
EU Sanctions Russian GRU Hackers for Cyberattacks Against Estonia
The European Union has taken decisive action against cyber threats by sanctioning three Russian military intelligence officers from Unit 29155 of the GRU. These individuals were implicated in a series of cyberattacks targeting Estonian government agencies in 2020. This move highlights the EU’s commitment to addressing and deterring cyber aggression, particularly from state-sponsored actors.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Hackers Steal $85 Million from Phemex Crypto Exchange
WIRE TOR - The EthicaOn January 23, 2025, Phemex, a prominent cryptocurrency exchange, fell victim to a sophisticated cyberattack that resulted in the theft of over $85 million worth of cryptocurrency. The breach has raised alarms across the cryptocurrency industry, which continues to grapple with security vulnerabilities despite advancements in blockchain technology.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
LTE, 5G Vulnerabilities Could Cut Entire Cities From Cellular Connectivity
The widespread adoption of LTE and 5G technologies has revolutionized global communication, enabling faster connectivity, lower latency, and the infrastructure for futuristic applications like autonomous vehicles and smart cities. However, a critical study reveals vulnerabilities in LTE and 5G core infrastructures that could lead to severe disruptions, including persistent denial-of-service (DoS) attacks affecting entire metropolitan areas.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
UnitedHealth Data Breach Affects 190 Million Americans in Record-Breaking Cyberattack
UnitedHealth has revealed that 190 million Americans had their personal and healthcare data stolen in the Change Healthcare ransomware attack, nearly doubling the previously disclosed figure.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01
Clone2Leak Attacks Exploit Git Flaws to Steal Credentials
A new set of Git vulnerabilities, collectively known as “Clone2Leak,” has come to light, exposing users to credential theft. These flaws highlight how improper parsing of authentication requests in Git and its credential helpers can be exploited to leak sensitive information such as passwords and access tokens. Git, a widely used version control system, relies on credential helpers to store and retrieve authentication credentials for seamless interactions with remote repositories. However, this convenience comes with risks, as attackers can exploit these tools to intercept and steal credentials when users interact with malicious repositories.
By WIRE TOR - Ethical Hacking Servicesabout a year ago in 01











