cybersecurity

Weekly digest #12
  • Hacken News
  • cybersecurity
  • +1

Weekly digest #12

A Facebook Messenger Flaw Could Have Let Hackers Listen In https://www.wired.com/story/facebook-messenger-bug-bounty/ Popular social network Facebook has its own bug bounty program, and this year they are paying out two of its three most considerable rewards everโ€”including $60,000 for a bug in Messenger. This critical bug could have allowed an attacker to call you and start

4 Dec 2020

Hacken Research: How Safe is Your NFT Wallet?
  • Insights
  • cybersecurity
  • +1

Hacken Research: How Safe is Your NFT Wallet?

Decentralized Finance has been the most discussed topic within the cryptosphere in 2020. However, other subsets in the blockchain industry have also been making a splash, particularly Non-fungible tokens – or NFTs – which have seen record-breaking sales throughout October. Non-fungible tokens are used to represent assets that have different values among themselves. This includes

4 Dec 2020

How to Bypass WAF. HackenProof Cheat Sheet
  • Discover
  • cybersecurity
  • +2

How to Bypass WAF. HackenProof Cheat Sheet

What is WAF? Web application firewall (WAF) is a set of monitors and filters designed to detect and block network attacks on a web application. WAFs refer to the application layer of the OSI model. The web application firewall is used as a security tool. In real time, it decides whether to grant or deny

2 Dec 2020

Hacken October 2020 in Review
  • Hacken News
  • bitcoin
  • +16

Hacken October 2020 in Review

Are you curious about what Haัken lived and what the team was up to last month? We have prepared our monthly report โ€” Hacken October in Review โ€” for you! Read, like, share and subscribe to our social media channels in order not to miss anything interesting and something significant! Enjoy! ๐Ÿ™‚ New Collaborations October

12 Nov 2020

Weekly News Digest #11
  • Industry News
  • cybersecurity
  • +1

Weekly News Digest #11

The Feds Seized $1 Billion in Stolen Silk Road Bitcoins Seven years ago, Ross Ulbricht was arrested in the science fiction section of a San Francisco library and charged with running the sprawling, dark web drug bazaar known as the Silk Road. When the FBI laid hands-on Ulbricht’s laptop that day, they found keys to

6 Nov 2020

Weekly News Digest #10
  • Industry News
  • cybersecurity
  • +1

Weekly News Digest #10

NVIDIA Patches Critical Bug in High-Performance Servers NVIDIA published a patch for a critical bug in their high-performance DGX servers that could open the door for a remote intruder to take control of and access sensitive data on systems typically operated by governments and Fortune-100 companies. Vulnerable NVIDIA DGX servers are affected by DGX-1, DGX-2,

30 Oct 2020

Hacken Research: Data Gone in 60 seconds. Dangerous SQL injection
  • Insights
  • cybersecurity
  • +3

Hacken Research: Data Gone in 60 seconds. Dangerous SQL injection

Overview How we would like to start this topic, perhaps with the fact that this is the most critical vulnerability and what it will cost for a webapp, business, brand. In the professional cybersecurity world, this vulnerability is considered the most critical according to OWASP Top10.  Nowadays, more and more people worry about their personal

28 Oct 2020

Weekly News Digest #9
  • Industry News
  • cybersecurity
  • +1

Weekly News Digest #9

New Chrome 0-day Under Active Attacks โ€“ Update Your Browser Now The new Chrome Zero-day vulnerability is actively exploited by the intruders. So Google is urgently notifying all users to update their browsers. Tracked as CVE-2020-15999, the actively exploited vulnerability is a type of memory-corruption flaw called heap buffer overflow in Freetype, a popular open-source

24 Oct 2020

Weekly News Digest #6
  • Industry News
  • cybersecurity
  • +1

Weekly News Digest #6

Microsoft Windows XP Source Code Reportedly Leaked Online The source code of one of the most popular Operating Systems in the past, Windows XP, was leaked. 43 Gbs of source code related to the XP family was published on torrent trackers. Last week some enthusiasts built Windows Server 2003 operating system from sources, so if

2 Oct 2020

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo