Netcrook

Attack Stories

173 article(s)

Ukraine’s Underwater Drone Attack: How Sub Sea Baby Hit a Russian Submarine in Novorossiysk

🗓 17 Dec 2025 · 👤 NEONPALADIN · 🌍 Europe

For the first time, a Ukrainian underwater drone penetrated Russian naval defenses, damaging a submarine in Novorossiysk. This unprecedented attack reveals new vulnerabilities in maritime security and signals a shift in Black Sea warfare.

Exposed Desires: The Inside Story of the Pornhub Premium Data Leak

🗓 17 Dec 2025 · 👤 INTEGRITYFOX · 🌍 North America

A massive leak of Pornhub Premium watch histories has left millions exposed, as hackers extort companies and tech giants argue over who is to blame. Get the inside story on one of the most personal data breaches ever.

GhostPairing: The WhatsApp Hack That Bypasses Passwords and SIM Cards

🗓 16 Dec 2025 · 👤 BYTESHIELD

GhostPairing is a cunning new attack that exploits WhatsApp’s device linking feature, allowing criminals to take over accounts globally with just a phone number. This feature explains how the scam operates, its global reach, and what users can do to stay safe.

GhostPairing: The Stealthy WhatsApp Hack That Lets Attackers Take Over With Just a Phone Number

🗓 16 Dec 2025 · 👤 INTEGRITYFOX · 🌍 Europe

GhostPairing is a sophisticated cyber attack that lets criminals hijack WhatsApp accounts using the app’s own device linking feature. No passwords or malware needed—just a moment of misplaced trust. Here’s how it works, who’s behind it, and what you can do to stay safe.

Fake mParivahan Apps Drive Major Android Malware Attack in India

🗓 15 Dec 2025 · 👤 BYTEHERMIT · 🌍 Asia

Cybercriminals are unleashing advanced Android malware disguised as official Indian government apps, stealing sensitive data and money from unsuspecting users. Discover how the NexusRoute campaign operates and why it poses a national-scale threat.

Apache StreamPark Encryption Key Flaw: How a Simple Mistake Exposed Global Data

🗓 15 Dec 2025 · 👤 BYTESHIELD

A critical vulnerability in Apache StreamPark left sensitive data exposed due to a hard-coded encryption key. This feature investigates how the flaw was discovered, its impact, and why organizations must act now.

Russian Finance Departments Hit by Phantom Stealer Malware in ISO Phishing Attack

🗓 13 Dec 2025 · 👤 BYTEHERMIT · 🌍 Europe

Hackers are deploying Phantom Stealer malware through malicious ISO files sent in fake payment confirmation emails to Russian finance and accounting teams. The campaign uses social engineering, email spoofing, and steganography to bypass security and steal sensitive data.

ConsentFix: How Hackers Hijack Microsoft Accounts via Azure CLI Abuse

🗓 12 Dec 2025 · 👤 BYTEHERMIT · 🌍 North America

A new phishing campaign, ConsentFix, takes advantage of Microsoft’s own Azure CLI tool to hijack cloud accounts—no password theft required. Discover how attackers exploit OAuth consent, why Azure CLI is the perfect target, and what makes this campaign nearly invisible to traditional defenses.

Shadowed Portals: Sophisticated Phishing Bypasses MFA on Microsoft 365 and Okta

🗓 12 Dec 2025 · 👤 DEBUGSAGE

A new breed of phishing attack targets Microsoft 365 and Okta users, using lookalike domains and session cookie theft to bypass MFA and compromise corporate accounts.

Update at Your Own Risk? Notepad++ Bug Lets Hackers Hijack Software Updates

🗓 12 Dec 2025 · 👤 NEBULASCOUT

A severe vulnerability in Notepad++’s update engine allowed hackers to hijack updates and install malware. The latest release fixes this flaw and reinforces the importance of robust software security.

« Prev 3   4   5   6   7   Next »