[Nulled] » Last publications on the website » Page 298

Hackers from TurkHackTeam claimed responsibility for a cyber attack on the website of the Swedish parliament in protest against the burning of the Koran, demanding an apology. Judging by the tweets, hackers are attacking everything in a row: telecom, banks, online medical journal sites and the subway. 

In recent years, the use of Cobalt Strike and Metasploit as tools for attacks on various types of systems has become very popular among attackers.

However, using these tools, security tools have learned to detect and stop attacks based on the information collected. In order to avoid detection of EDR and various antivirus solutions, hackers had to try other options. 

Tacito Security researchers have released a PoC exploit for a vulnerability called iTLB multihit.

The error affects a fairly wide range of Intel processors and is associated with the associative translation buffer (TLB), a specialized CPU cache used to accelerate the translation of virtual memory addresses to physical memory addresses.

 

Two pieces of news made our day.

The first is that the TaserCon conference, organized by Axon, will be held in Las Vegas this week, at which the latter will announce a plan to place drones with stun guns in American schools. By the way, Axon has a rich experience of throwing American citizens into the soup, because it is she who is the developer and manufacturer of Taser police tasers, whose name has already become a household name.

Secret documents of the Taiwan National Security Bureau (NSB) can be purchased on breached for $150,000.

Taiwan's main intelligence agency is investigating a possible leak, but so far has not confirmed the authenticity of the documents appearing on the darknet.

Apple has released fixes to address numerous serious security vulnerabilities for the flagship iOS and macOS platforms.

The most serious of the documented vulnerabilities affect WebKit and can expose iOS and macOS devices to code execution attacks through malicious web content.

The Canadian distributor of alcoholic beverages Liquor Control Board of Ontario (LCBO) was attacked by Magecart, which led to the compromise of personal data of users.

LCBO is one of the largest sellers of alcoholic beverages in Canada and sells alcoholic beverages throughout the province of Ontario, operating more than 670 stores with a total staff of almost 8000 people.

A video game developer from Los Angeles is not up to games.

Riot Games is an American video game developer, publisher and organizer of esports tournaments, known for creating popular League of Legends and Valorant games.

Rapid7 announces the start of operation of the recently fixed critical CVE-2022-47966 in Zoho ManageEngine even before Horizon3.ai released its own PoC exploit.

The problem, considered critical, was discovered in November 2022, when Zoho announced the release of fixes for more than 20 affected local products.

​Reset the system to factory settings!

If your Windows system has started to slow down and you want to reinstall it, then it's better to try resetting it to factory settings first. As a result of such a reset, many problems can be fixed, and you will spend less time restoring the system to health. 

​How to recognize blurry text in images?

Quite often on the Internet in screenshots or videos we find personal information or text that is hidden with the help of a blur effect. Thus, the text cannot be read with the help of a human eye, but a special neural network called Unredacter can do this. 

Let's assume that there is nothing besides the victim's login.

Here is the algorithm for hacking an Instagram account that I use:

​How to set passwords in the form of emojis?

We present you a rather interesting extension called Identiji → TYK ←. It allows you to create passwords in the form of emojis, which, in turn, is designed to make life easier for those who constantly forget passwords and do not like to use standard passwords. 

How do I hide text in an image?

We present to your attention an online service called Steganography Tools → TYK ←. It allows you to easily hide the text you are interested in in an image, without having special skills in the console. In addition to pictures, the service can hide text in audio files. 

​Solving the problem of high RAM consumption in Windows!

Today we will show you one of the methods to solve the problem of large RAM consumption in Windows, which is suggested to be used by EaseUS technical support specialists, namely: disabling NDU in the registry.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    January 2025    »
MonTueWedThuFriSatSun
 12345
6789101112
13141516171819
20212223242526
2728293031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +4 Total articles 6764
  • +13 Comments 4255
  • +29 Users : 6207