New: maliciousAll contenthive-129948hive-196917krzzansteemhive-183959hive-180932hive-166405photographyhive-185836uncommonlabhive-150122hive-183397hive-144064bitcoinlifehive-188619hive-103599krsuccesshive-101145hive-139150hive-124908hive-145157hive-184714hive-109690TrendingNewHotLikersblockchainhorror (73)in blockchain • 3 months agoCointelegraph - A new crypto scam involves tricking users into scanning malicious QR codes, leading to wallet theft and over $120,000 in lossesA new crypto scam involves tricking users into scanning malicious QR codes, granting scammers access to their wallets and stealing funds. The scam has resulted in losses of over $120,000 for at…hacxx (36)in hacxx • 5 months agoHacxx Malicious Tool Generator 2 - Free Download and Online VersionHow to? 0 - Open the html file, since all the codes require UAC, Select 0 and Generate Complete with the name for the app 1 - Select 1 and generate Type username Type password…hacxx (36)in hacxx • 5 months agoHacxx Malicious Tool.bat - Free Download1 - Elevate to admin this .bat 2 - Add hacxx account as admin 3 - Share c:\ on the network 4 - Firewall bypass for any.exe 5 - Download and execute a remote .exe 6 - Save Wifi names 7 - Save…hacxx (36)in hacxx • 5 months agoHacxx Malicious Tool Generator - Free Download and Online VersionHow to? 1 - Open the html file, since all the codes require UAC, Select 1 and Generate 2 - After that, if you want to use shares. Select 2 and Generate. Type the drive you want to open shares…pomeline (79)in football • 11 months agoI'm a little late to the Damontae Kazee suspension story.Honestly, I needed some time to calm down. It's not that a care about the Steelers or the Colts but for how they impact the Bills' path to the post season. I care about football, and things making…blockchainhorror (73)in blockchain • 3 years agoTechCrunch - North Korean hackers are targeting blockchain companies with malicious crypto-stealing appsAccording to the FBI, CISA, and the U.S. Treasury Department, North Korean hackers are targeting various blockchain and cryptocurrency industries, including crypto exchanges and venture capital…blockchainhorror (73)in blockchain • 3 years agoFortune - A crypto investor lost $120,000 from clicking on one bad link. His horror story is becoming increasingly common.Reddit user PowerofTheGods, who lost $120,000 by clicking one bad link, shows the vulnerability of current investors. He has been investing since 2016 and continues to invest in four Metamask…arbitration (78)in media • 3 years agoThe thing that's really fucked up about the media debate is its focus.I do believe firmly that a person or media outlet that is well intentioned, honest, and occasionally wrong is more defensible than one with malicious intent that happens to be right. When it comes…limner (76)in malicious • 3 years agoMALICIOUS , PlayStation 3Have you ever played demons or Dark Souls and thought to yourself this could use an enemy aesthetic be more over-the-top and somehow only be slightly easier if so you have a strange thought…afl.cloud (59)in hive-138458 • 3 years agosteemCreated with Sketch.Think again when you throw your personal information!Millions of people carelessly toss their sensitive information aside every day, and criminals know what to do with this wealth of information. #Cyber #security experts have approached the…afl.cloud (59)in hive-173434 • 3 years agosteemCreated with Sketch.Hidden danger waiting for MacOS usersSince August 2019, Kaspersky has been tracking the #malicious Trojan #Milum used by the advanced persistent threat (APT) actor #WildPressure active in the Middle East. #Kaspersky researchers…afl.cloud (59)in trezor • 4 years agosteemCreated with Sketch.Fake Trezor Application on AppStore Costed 600.000 Dollars!According to the claims, a person lost 600.00 dollars due to the fake Trezor application he downloaded from #Apple. According to the latest news, a Trezor app on Apple mimics the real Trezor.…cybersecway.com (31)in keylogger • 4 years agoWays to protect yourself against keyloggersThе wоrld-widе-wеb (www) hаѕ givеn uѕ thе аbilitу аnd fасilitу tо dо еvеrуthing with оur соmрutеr ѕуѕtеm. But ѕаdlу, thе ѕаmе thing еxроѕеѕ uѕ tо thе riѕk оf hаving оur реrѕоnаl infоrmаtiоn оr…afl.cloud (59)in cyber • 4 years agoCyber scammers use inactive domains#Kaspersky researchers have identified over a thousand inactive domains that refer visitors to unwanted internet addresses for profit. According to Kaspersky's description, Kaspersky researchers…kisscrypto.com (42)in antivirus • 4 years agoWhat is crypto-jacking? All about It.Cryptojacking is a malpractice, which helps an unauthorized person to mine the cryptocurrency from another person’s computer/resources. It is an emerging threat online that has the capability to…twr (53)in bug • 5 years agoVulnerability Hit Truecaller App Potentially Affecting Millions Of UsersThe popular call-blocking application Truecaller has recently made it to the news due to a security flaw. A researcher discovered a serious vulnerability in the Truecaller app that could have…doifeellucky (64)in ios • 5 years agosteemCreated with Sketch.via threatpost.com: ThreatList: Sharp Increase in Fake Mobile Apps Impersonating Legit OnesAuthor: Elizabeth Montalbano Consumers don’t vet apps well enough to mitigate mobile threat risk, according to the latest mobile-threat report from RiskIQ Malicious mobile apps that try to…doifeellucky (64)in malware • 5 years agosteemCreated with Sketch.via threatpost.com: Cybercrooks Target U.S. Veterans with Fake Hiring WebsiteAuthor: Lindsey O'Donnell A known threat actor, Tortoiseshell, is targeting U.S. military veterans with a fake veteran hiring website that hosts malware. Researchers are warning that a fake…afl.cloud (59)in wordpress • 5 years agoDanger on WordPress Websites!There was an improvement that would spoil the taste of those who prepared the website through Wordpress. According to a research, hackers, using a vulnerability found in WordPress sites "illegal…tolae (43)in trend • 5 years agoTrend Micro protects companies from malicious emails: the Forrester Research reportForrester Research has appointed Trend Micro as the leader in the email privacy category. Trend Micro reached the greatest ratings in the categories of "technology management" (sub-category of…