Advertisement · 728 × 90
#
Hashtag
#HACKER
Advertisement · 728 × 90

what if u 3d printed weed? #hacker #ai #bigclouds #smokesup #showertbougt

2 1 0 0
Post image

Cyberpunk Orc, hacking with more than an axe #shadowrun #cyberpunk #nsfw #hacker #art #commission

2 0 0 0
Abstraction portrait with cyber hacker with big "deleted " behind him

Abstraction portrait with cyber hacker with big "deleted " behind him

Deleted DeletedDeletedDeletedDeletedDeletedDeletedDeletedDeletedDeletedDeletedDeletedDeletedDeletedDeletedDeleted

#cyberpunk #scifi #cyborg #hacker

166 40 3 0
Post image

🚨 CYBER-ALARM: 108 Chrome Extensions greifen Nutzer an!
Sie stehlen Login-Daten, Cookies & übernehmen Sessions 😳

Das Gefährliche: Sie wirken komplett harmlos…

👉 Check jetzt deine Erweiterungen!

#cybersecurity #hacker #chrome #datenschutz #itsecurity #wasacon

0 0 1 0
Preview
→ zum Artikel


#Hacker #Nato #Russland #Mordor ☭★☠️

0 0 0 0
Post image

🚨 Cyberwarnung: Nordkoreanische Hacker greifen jetzt über Facebook an!
APT37 nutzt Chats, um Vertrauen aufzubauen und Malware zu platzieren.
👉 Kein Spamfilter, kein Schutz – der Angriff kommt direkt zu dir.

#cybersecurity #hacker #facebook #apt37 #wasacon

0 0 1 0
Preview
Hackers Still Target iPhone, Android Users in New Hack-for-Hire Phishing Campaign A new cybersecurity investigation has uncovered an existing hacking campaign targeting smartphones running both iOS and Android, revealing that attackers continue to rely on surprisingly simple but effective methods. The operation has reportedly focused on journalists, activists, and government officials across the Middle East and North Africa, with additional victims identified in Europe and North America. Coordinated Hack-for-Hire Campaign Exposed by Security Researchers TechCrunch reported that the findings come from three cybersecurity organizations, Access Now, Lookout, and SMEX, which independently analyzed the activity and identified overlapping evidence pointing to a long-running espionage operation. The group behind the attacks, known as BITTER APT, is believed to be linked to a commercial hack-for-hire ecosystem operating on behalf of clients seeking surveillance capabilities. Rather than relying on advanced zero-day exploits, the campaign largely depends on phishing, demonstrating that deception remains one of the most effective tools in modern cyberattacks. Apple ID Phishing Used to Gain Deep Device Access One of the primary attack methods involved tricking Apple users into entering their Apple ID credentials on fake login pages. Once obtained, these credentials allowed attackers to access iCloud backups and sensitive personal data tied to compromised accounts. According to 9to5Mac, researchers identified nearly 1,500...

Hackers Still Target iPhone, Android Users in New Hack-for-Hire Phishing Campaign
->Tech Times | More on "Hack-for-hire smartphone phishing campaign" at BigEarthData.ai | #Hacker #Technology

0 0 0 0
THE KING OF THE INTERNET (O REI DA INTERNET) João Guilherme. #21
THE KING OF THE INTERNET (O REI DA INTERNET) João Guilherme. #21 YouTube video by moviereviewsnmore

youtu.be/DOBnBin4c4c?... THE KINGS OF THE INTERNET star Joao Guilherme talks about his new movie on Movie Reviews and More. #moviereviewsandmore #briansebastian #dreamweaverarts #joaoguilherme #brazil #hacker

1 0 0 0

Fixed the chapter links…. Now u can read forwards chapter by chapter… #hacker #tech

3 2 0 0
😱💣Han HACKEADO ROCKSTAR!💣😱*El FIN de GTA VI? | Noticia + Opinión
😱💣Han HACKEADO ROCKSTAR!💣😱*El FIN de GTA VI? | Noticia + Opinión YouTube video by Flectro777

NOTICIA BOMBA!!!💥💣

Nuevo video YA en el canal😏

youtu.be/3ZGjYrGiMmU?...

#gaming #hacker #gta6 #rockstar #noticia #youtube

1 1 0 0
Post image Post image Post image Post image

Attackers rarely pick targets at random.

They instead look for specific gaps before making a move.

#IT #Infosec #Cybersecurity #Hacker #Business

1 0 0 0
Hackers Use 108 Chrome Extensions to Steal User Data Through Shared C2 Infrastructure A widespread cyber espionage campaign leveraging 108 malicious Google Chrome extensions. According to a recent report by Socket, these extensions are explicitly designed to steal sensitive user data and hijack active web sessions. The attackers manage this extensive operation through a highly organized, shared Command and Control (C2) infrastructure. This centralized setup makes it significantly easier for threat actors to scale their data theft efforts across thousands of potential victims without needing to build new backends for every tool. Rogue Extensions Funnel User Data Often disguised as legitimate productivity tools, utility apps, or browser enhancements, these rogue extensions trick users into downloading them. Once installed, their true malicious intent is activated, hidden within the background scripts. The malware silently monitors web browsing activity and harvests critical personal and corporate information. Because the attackers rely on a shared C2 network, all 108 extensions funnel their stolen data back to the same group of malicious servers. This shared backend allows the hackers to efficiently update their malicious payloads, issue new commands, and process massive amounts of stolen information simultaneously. The primary objective of this coordinated campaign is data exfiltration and session theft. The extensions are programmed to copy browser cookies and active...

Hackers Use 108 Chrome Extensions to Steal User Data Through Shared C2 Infrastructure
->CybersecurityNews | More on "Chrome extensions stealing user data" at BigEarthData.ai | #Data #Hacker #Technology

0 0 0 0
Preview
Issues 41 - 60 of Russian Hacker or "Khaker: Computer Hooligan Magazine" (‘‘XAKEP’’) : XAKEP : Free Download, Borrow, and Streaming : Internet Archive Issues 21 through 40 of Russian hacker magazine ‘‘XAKEP’’, from 200 through to 2002. A publication for hackers, or “khakeri”, made by...

#History of the #hacking scene in 2 countries is a mini fixation of mine, #Russia & #China. In an effort to make this history more accessible I have been uploading archives of #hacker zines from both countries to Internet Archive, as part of this, issues 41 - 60 of XAKEP.
archive.org/details/XAKE...

11 3 1 1
Preview
Fake Claude Website Distributes PlugX RA https://www.osintinvestigate.com The malware mimics the legitimate Anthropic installation, relies on DLL sideloading, and cleans up after itself.

📣 New Podcast! "Fake Claude Website Distributes PlugX RA" on @Spreaker #anthropic #claude #claudeai #cybercrime #cybercriminals #cyberinvestigations #cybersecurity #fake #hacker #hackerattack #hackers #hackersattack #malware #osint #phishing #ransomware #secuirty #securityattack #threats

0 0 0 0
Preview
International Operation Targets Multimillion-Dollar Crypto Theft Schemes https://www.osintinvestigate.com Law enforcement in the US, UK and Canada identified more than $45 million in cryptocurrency and froze $12 million.

📣 New Podcast! "International Operation Targets Multimillion-Dollar Crypto Theft Schemes" on @Spreaker #crypto #cryptocurrency #cryptostolen #cybercrime #cybercriminals #cyberinvestigations #cybersecurity #digitalinvestigations #fraud #hacker #hackerattack #hackers #hackersattack #malware

0 0 0 0
Hackers Exploit Kali Forms Vulnerability to Take Over WordPress Sites A recently disclosed Kali Forms vulnerability affecting a widely used WordPress plugin has escalated into an active security threat, enabling unauthenticated attackers to achieve Remote Code Execution on affected websites. The flaw impacts Kali Forms, a drag-and-drop form builder with more than 10,000 active installations, and has already been exploited in the wild shortly after public disclosure. Security researchers reported that the vulnerability was first submitted on March 2, 2026, through a bug bounty program, identifying a critical Remote Code Execution issue in the Kali Forms vulnerability chain. The vendor released a patched version on March 20, 2026, and the issue was simultaneously added to the Wordfence Intelligence database. On the same day, attackers began actively exploiting it on scale. Timeline of the Kali Forms Vulnerability in the WordPress Plugin Ecosystem The Kali Forms vulnerability followed a rapid disclosure-to-exploitation cycle: March 2, 2026: Initial submission of the Remote Code Execution flaw via bug bounty reporting. March 5, 2026: Wordfence Premium, Care, and Response users received firewall protection. March 20, 2026: Patched version released; vulnerability publicly disclosed; attackers began exploiting the same day. April 4, 2026: Free Wordfence users received delayed firewall protection. April 4–10, 2026: Peak exploitation activity observed against...

Hackers Exploit Kali Forms Vulnerability to Take Over WordPress Sites
->The Cyber Express | More on "Kali Forms WordPress security exploit" at BigEarthData.ai | #Hacker #Technology

0 0 0 0
Preview
Booking.com Says Hackers Accessed User Information https://www.osintinvestigate.com The online travel platform has not said how many customers’ booking information was exposed, but said the issue has been contained. 

📣 New Podcast! "Booking.com Says Hackers Accessed User Information" on @Spreaker #booking_com #cyberattack #cyberciminals #cybercrime #cyberinvestigations #cybersecurity #databreaches #hacker #hackerattack #hackers #hackersattack #investigations #malware #osint #phishing #ransomware #security

0 0 0 0
Preview
Dal falso WhatsApp di Asigint a Hacking Team, ecco come l'Italia è diventata uno dei maggiori produttori mondiali di spyware Le aziende italiane sono tra le prime al mondo per la produzione e vendita di software per la sorveglianza digitale: un rischio per i diritti umani e la privacy

#Spioni nostrani. Oserei dire #dop.

#software #hacker #spyware

www.wired.it/article/ital...

2 0 0 0
Preview
Un hacker aurait infiltré un des plus puissants supercalculateurs chinois: il aurait volé des millions de gigaoctets de données stratégiques, qu’il chercherait désormais à vendre Un ou plusieurs hackers non identifiés ont revendiqué le piratage du Centre national de supercalcul de Tianjin, en Chine, et le vol de plus de 10 pétaoctets de données, soit l’équivalent de 10 million...

Une #cyberattaque qui pourrait faire grand bruit
👉Un #hacker aurait infiltré un des plus puissants supercalculateurs chinois
👉Il aurait volé des millions de gigaoctets de données stratégiques, qu’il chercherait désormais à vendre
www.bfmtv.com/tech/cyberse...

1 1 0 0
Video

How people think hacking looks.

#hacker

1 0 0 0
Preview
→ zum Artikel


#Cyberangriff #Hacker

0 0 0 0
Hackers meet their match: New DNA encryption protects engineered cells from within

Hackers meet their match: New DNA encryption protects engineered cells from within
->Phys.org | More on "DNA encryption engineered cell security" at BigEarthData.ai | #Technology #Hacker

0 0 0 0
Post image

Coming Soon 👀 Will you be ready?

#Hacker #TrustedSec #legend

0 0 0 0
Preview
Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks https://www.osintinvestigate.com Federal agencies warn attackers are manipulating PLC and SCADA systems across multiple sectors, triggering operational disruptions and raising concerns over broader OT targeting.

📣 New Podcast! "Iran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks" on @Spreaker #cyberattack #cybercrime #cyberinvestigations #cybersecurity #cyberwar #fbi #hacker #hackerattack #hackers #hackersattak #iran #malware #osint #osintinvestigations #phishing #ransomware #usa

0 0 0 0
Preview
OSINT Briefing April 13, 2026 – Global Intelligence Analysis, Cyber Threats, and Geopolitical Risk Update Daily OSINT briefing for April 13, 2026. Expert analysis on global intelligence, geopolitical risks, cyber threats, and open-source insights by https://www.osintinvestigate.com

📣 New Podcast! "OSINT Briefing April 13, 2026 – Global Intelligence Analysis, Cyber Threats, and Geopolitical Risk Update" on @Spreaker #cybercrime #cyberinvestigations #cybersecurity #cyberthreatintelligence #disinformation #geopolitical #geopolitics #gold #hacker #hackers #oil #osint

0 0 0 0
How a Hacker Used Claude and ChatGPT to Breach Multiple Government Agencies? A lone threat actor compromised nine government agencies of Mexico, extracting hundreds of millions of citizens’ data in a synchronized cyberattack operation. This operation took place between late December 2025 and mid-February 2026, demonstrating a notable change in the approach of contemporary attacks. Gambit Security researchers published a comprehensive technical report following the preliminary reactions by the attacked agencies. These results demonstrate the use of artificial intelligence throughout the operation, both in its planning and implementation. Claude and ChatGPT as an active operator The perpetrator was highly dependent on two artificial intelligence systems: Claude Code from Anthropic and GPT-4.1 from OpenAI. Claude Code carried out most of the practical activities. Forensic data indicates that the system generated and executed roughly 75% of all remote commands during the incident. The perpetrator established 34 active sessions through the compromised systems and made 1,088 requests. These requests were responsible for generating 5,317 commands. Such automation is not common in cybersecurity breaches. During a regular attack, perpetrators typically develop scripts before launching them or execute commands manually. In the present case, the artificial intelligence functioned as an almost live operator, performing operations based on user instructions. Concurrently, GPT-4.1 was responsible for reconnaissance and data...

How a Hacker Used Claude and ChatGPT to Breach Multiple Government Agencies?
->Techstory | More on "AI-assisted hacking government data breaches" at BigEarthData.ai | #Chatgpt #Technology #Hacker #AI

0 0 0 0