Cybersecurity Blog
Read Hackdra’s cybersecurity blog to learn strategies to strengthen your attack resistance with the help of highly skilled ethical hackers. Improve your security profile and stay up-to-date on industry trends and emerging threats.
Featured Posts

Smart Contract Auditing: A Necessary Step Towards Security and Success
As blockchain technology transforms global business models, self-executing digital contracts called smart contracts have become a core component of decentralized finance. By automating routine processes like payments, record-keeping and asset transfers, smart contracts streamline transactions and reduce costs. However,...

State-sponsored Cloudflare Attack
Web security company Cloudflare on Thursday revealed that a threat actor used stolen credentials to gain access to some of its internal systems. The threat actor, believed to be state-sponsored, was discovered on November 23, nine days after the actor...

Phishing Attacks on Telegram on the Rise
Cybersecurity researchers are calling attention to the “democratization” of the phishing ecosystem as Telegram has become the epicenter of cybercrime, allowing threat actors to launch mass attacks for as little as $230. This is not the first time the popular...

Botnet Targeting SSH Servers for Crypto Mining: NoaBot
A new botnet called NoaBot, based on Mirai, has been utilized by cyber attackers as part of a crypto mining campaign since the beginning of 2023. Mirai, whose source code was leaked in 2016, became the precursor to numerous botnets;...

3 Malicious PyPI Packages Targeting Linux with Crypto Miners Found
Three new malicious packages with the ability to distribute a cryptocurrency miner to affected Linux devices have been discovered in the Python Package Index (PyPI) open-source repository. The three harmful packages, named Modularseven, driftme, and catme, were downloaded a total...

Breakthrough in Effective Cyber Intelligence Activities: Deepweb
The web world is a cyber space consisting of layers. While the visible web, known as the Surface Web, represents the tip of the iceberg, the parts of the Internet that we cannot see, the deeper layers, are referred to...

Understanding the Power of Smart Contract Technology
Decentralized applications (DApps) and smart contracts are transforming industries by leveraging the security and transparency of blockchain technology. But what exactly are DApps and smart contracts, and how do they work? This in-depth guide explores the key concepts. ...

Justice Department Charges 19 People in $68 Million Dark Web Scam
The US Department of Justice (DoJ) announced that it has charged 19 individuals worldwide in connection with the now-defunct xDedic Marketplace, which is estimated to have facilitated more than $68 million in fraud. Completing its investigation into the dark web...

Comprehensive Security Audits for Blockchain Projects
As blockchain technology continues its meteoric rise, more organizations are leveraging its decentralized nature to power innovative applications across industries. However, while blockchain’s core attributes make it well-suited for a variety of use cases, its underlying infrastructure remains susceptible...