hacking
-
Blog
Kali Linux 2025.2 released with 13 new tools, car hacking updates
Kali Linux 2025.2, the second release of the year, is now available for download with 13 new tools and an expanded car hacking toolkit. Designed for cybersecurity professionals and ethical hackers, the Kali Linux distribution facilitates security audits, penetration testing, and network research. The Kali Team has added many new features and refined the distro’s user interface. Notable changes include: Renamed…
Read More » -
Blog
‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy
Business leaders need to stay up to date with geopolitics to keep their cybersecurity strategies up to date and mitigate the risks posed by state-backed hacker groups. This is the message that Paul Chichester, director of operations at the UK’s National Cyber Security Centre (NCSC), delivered to attendees at a keynote session of Infosecurity Europe 2025. The call to action…
Read More » -
Blog
Microsoft and CrowdStrike partner to link hacking group names
Microsoft and CrowdStrike announced today that they’ve partnered to connect the aliases used for specific threat groups without actually using a single naming standard. As the two companies explained on Monday, this will be done by mapping (or linking) the different names their security analysts use for each group they track. Microsoft has updated its threat actor reference guide with…
Read More » -
Blog
DOGE staffer allegedly ran company providing services to hacking group – Computerworld
Breaking into law enforcement accounts Crimes EGodly boasted it had carried out include cryptocurrency theft, phone number hijacking, and breaking into law enforcement email accounts, Reuters said. The group also circulated personal details of an FBI agent it believed was investigating it, and engaged in swatting, the practice of calling armed police to a target’s house on false pretenses as…
Read More » -
Blog
Billions of Devices at Risk of Hacking Due to Hidden Commands
Tarlogic team giving their presentation during RootedCON. Image: Tarlogic Billions of devices worldwide rely on a widely used Bluetooth-Wi-Fi chip that contains undocumented “hidden commands.” Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. ESP32, manufactured by a Chinese company called Espressif, is a microcontroller that enables Bluetooth and Wi-Fi connections in numerous…
Read More » -
Blog
FBI seizes domains for Cracked.io, Nulled.to hacking forums
The FBI has seized the domains for the infamous Cracked.io and Nulled.to hacking forums, which are known for their focus on cybercrime, password theft, cracking, and credential stuffing attacks. While some of their members also engaged in ethical hacking discussions, the sites were widely regarded as a hub for cybercriminal activity. They also hosted content related to software cracks, hacking tools…
Read More » -
Blog
TalkTalk investigates breach after data for sale on hacking forum
UK telecommunications company TalkTalk is investigating a third-party supplier data breach after a threat actor began selling alleged customer data on a hacking forum. “As part of our regular security monitoring, given our ongoing focus on protecting customers’ personal data, we were made aware of unexpected access to, and misuse of, one of our third-party supplier’s systems, however, no billing…
Read More » -
Blog
This Complete Ethical Hacking Bundle Is Now $35
As cybercrime has grown over the past few years, the demand for ethical hackers has reached a new height. These security specialists are paid to break into corporate networks and systems to expose vulnerabilities, thereby finding what needs to be patched up and protected. It’s a lucrative career, and whether you’re looking for ways to protect your business or add…
Read More » -
Blog
Smart Appliances Could Expose Your WiFi to Hacking Risks
Earlier this year, Consumer Reports researched how long appliance companies like GE, LG, and Samsung tell their customers they’ll keep their appliances’ software updated. This is important because security experts are constantly finding and fixing vulnerabilities in software—along with supplying new features—that’s why your phone and laptop get regular updates for years after you buy them. The CR researchers looked…
Read More » -
Blog
Enter the World of Ethical Hacking with Confidence
TL;DR: Get lifetime access to The 2024 All-in-One Ethical Hacking Course Bundle for just $44.99 and start mastering ethical hacking techniques to protect and secure networks. The 2024 All-in-One Ethical Hacking Course Bundle is a must-have for professionals and aspiring cybersecurity experts looking to enhance their skills in a rapidly evolving field. With 18 comprehensive courses totaling 92 hours of…
Read More »