Hacking & Ethical Hacking

Case studies, ethical dilemmas, and legal aspects of hacking.

silentcryptominer
|

The Rise of Windows Packet Divert Abuse

In recent months, a surge in the use of Windows Packet Divert (WinDivert) drivers has been observed, primarily to intercept and modify network traffic on Windows systems. These…

routers
| | |

U.S. Lawmakers Urge Americans to Ditch Chinese-Made TP-Link Routers Over Security Risks

WASHINGTON, March 5 (Reuters) – A U.S. congressional committee is warning Americans to replace Chinese-made wireless routers, including those manufactured by TP-Link, citing national security concerns. Lawmakers argue…

Malvertising Github
|

Massive Malvertising Campaign Delivers Info Stealers Malware via GitHub

Cybercriminals continue to evolve their tactics, leveraging legitimate platforms to distribute malicious payloads. Microsoft Threat Intelligence has uncovered a large-scale malvertising campaign that infected nearly one million devices…

Exposed: The Rise of China’s Hacker-for-Hire Operations
|

Exposed: The Rise of China’s Hacker-for-Hire Operations

How China’s Cyber Mercenaries Are Reshaping Global Security In a major legal breakthrough, the U.S. Department of Justice (DOJ) and FBI have unsealed indictments against 12 Chinese nationals…

Ethical Hacking: Navigating the Complex Landscape of Cybersecurity
|

Ethical Hacking: Navigating the Complex Landscape of Cybersecurity

The term “hacker” often conjures images of cybercriminals exploiting vulnerabilities for malicious purposes. However, many individuals, known as ethical hackers, penetration testers, and security researchers, dedicate their skills…