Cybersecurity Blog
Read Hackdra’s cybersecurity blog to learn strategies to strengthen your attack resistance with the help of highly skilled ethical hackers. Improve your security profile and stay up-to-date on industry trends and emerging threats.
Featured Posts

AI-Powered Security: To Be One Step Ahead For The Future Of Web
Web3 technology, with its innovative features such as decentralized applications, smart contracts and digital asset management, is shaping the future of the digital world. However, this new technological transformation also brings new security challenges. Traditional cybersecurity methods are insufficient against...

What Are The Common Vulnerabilities Of Blockchain Security?
As blockchain adoption accelerates, protecting networks assumes greater importance. However, without prudent precautions, emerging technologies remain exposed. This guide outlines prevalent vulnerabilities and best practices for robust security. The Distributed Nature of Blockchains Enables 51% Attacks Decentralization underpins blockchain integrity,...

3 Malicious PyPI Packages Targeting Linux with Crypto Miners Found
Three new malicious packages with the ability to distribute a cryptocurrency miner to affected Linux devices have been discovered in the Python Package Index (PyPI) open-source repository. The three harmful packages, named Modularseven, driftme, and catme, were downloaded a total...

Russian Computer Hackers Stole Microsoft Source Code
Microsoft has announced that a notorious hacker group supported by the Russian government, known as Midnight Blizzard (also known as APT29 or Cosy Bear), managed to gain access to some source code repositories and internal systems following a hack that...

Understanding Cyber Risk with CVSS Vulnerability Scoring
As cyber attacks rise in frequency and impact, effectively prioritizing security vulnerabilities has never been more important for organizations. The Common Vulnerability Scoring System (CVSS) provides a standardized approach to help information security teams objectively measure risk and allocate resources....

Global Coalition and Tech Giants Unite Against Spyware Exploitation
Dozens of countries, including France, the UK and the US, as well as a coalition of technology companies including Google, MDSec, Meta and Microsoft, have signed a joint agreement to curb the misuse of commercial spyware in ways that lead...

State-sponsored Cloudflare Attack
Web security company Cloudflare on Thursday revealed that a threat actor used stolen credentials to gain access to some of its internal systems. The threat actor, believed to be state-sponsored, was discovered on November 23, nine days after the actor...

Comprehensive Security Audits for Blockchain Projects
As blockchain technology continues its meteoric rise, more organizations are leveraging its decentralized nature to power innovative applications across industries. However, while blockchain’s core attributes make it well-suited for a variety of use cases, its underlying infrastructure remains susceptible...

Theft of Funds from Crypto Platforms on the Decline in 2023
Over the past few years, cryptocurrency hacking has become a widespread and formidable threat, resulting in billions of dollars being stolen from crypto platforms and exposing vulnerabilities in the ecosystem. In last year’s Crypto Crime Report, 2022 was the biggest...