Cybersecurity Blog
Read Hackdra’s cybersecurity blog to learn strategies to strengthen your attack resistance with the help of highly skilled ethical hackers. Improve your security profile and stay up-to-date on industry trends and emerging threats.
Featured Posts
New MacOS Backdoor Threat from North Korean Hackers
A new macOS backdoor threat called SpectralBlur has been discovered from North Korean hackers. This malicious software bears similarities to KANDYKORN, an advanced implant that functions as a remote access trojan capable of taking control of a compromised host. Additionally,...
Hacking for Good: Bug Bounty Programs and Identifying Vulnerabilities
Bug bounty programs have become an increasingly popular strategy for companies to discover and remedy security flaws in their digital products and services. By incentivizing ethical hackers to hunt for bugs, these initiatives allow organizations to take advantage of...
Medibank Hacking Led to Sanctions Against Russia
In late 2022, the personal information of 9.7 million Australians was stolen from Medibank, the country’s largest health insurance company. Sensitive documents, including abortion records, were then published online. The cyber sanctions, the first of their kind in Australia, include...
Career Opportunities in Cyber Security
With the rise of remote work and persistent cyber threats, the need for skilled cybersecurity professionals has never been greater. This article explores in-demand career paths in this growing industry and the requirements to succeed in each. Choosing a...
Smart Contract Auditing: A Necessary Step Towards Security and Success
As blockchain technology transforms global business models, self-executing digital contracts called smart contracts have become a core component of decentralized finance. By automating routine processes like payments, record-keeping and asset transfers, smart contracts streamline transactions and reduce costs. However,...
Justice Department Charges 19 People in $68 Million Dark Web Scam
The US Department of Justice (DoJ) announced that it has charged 19 individuals worldwide in connection with the now-defunct xDedic Marketplace, which is estimated to have facilitated more than $68 million in fraud. Completing its investigation into the dark web...
CISA Adds 6 Vulnerabilities: Apple Also on Attack List
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security vulnerabilities to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This includes a high-severity security vulnerability, CVE-2023-27524 (CVSS score: 8.9), affecting Apache Superset, an open-source...
The Virtual Universe of the Future: Elquidyll
Elquidyll is a 2D RPG, P2E card game that aims to provide players with different ways to win while also offering them an enjoyable gaming experience. It seeks to address the challenges faced by existing GameFi initiatives, particularly those looking...
Botnet Targeting SSH Servers for Crypto Mining: NoaBot
A new botnet called NoaBot, based on Mirai, has been utilized by cyber attackers as part of a crypto mining campaign since the beginning of 2023. Mirai, whose source code was leaked in 2016, became the precursor to numerous botnets;...