• ChatGPT Vulnerable to Manipulation using Hex Code

    Generative AI such as ChatGPT, Gemini, and Copilot can generate just about anything and although the majority uses these models in constructive ways, there are always bad actors looking to use them for malicious purposes. Therefore, companies that bring us these models must prevent bad actors from using their products for such purposes. Most companies…

    Read More

  • The Ultimate Guide to Cybersecurity for Remote Workers: Best Practices for Staying Safe Online

    In today’s digital age, working remotely is more than a trend—it’s the new normal for many professionals. But whether you’re working remotely for a company or yourself, cybersecurity challenges can quickly become personal. Hackers know that many remote setups lack the robust security of traditional office environments, making them an easier target than an office…

    Read More

  • CVE-2024-47575: Critical Vulnerability in Fortinet’s Fortimanager

    Fortinet has made the news once again with a critical flaw in their software management platform FortiManager which could allow a remote attacker to run code on unpatched systems and, due to the managerial nature of the application, possibly spread further into the network. The vulnerability tracked, as CVE-2024-47575, has a CVSS score of 9.8…

    Read More

  • Cyprus Thwarts Cyber Attack on Government Sites

    The Cyprus government faced a string of attacks over a three-day period targeting state-run utilities and the Cypriot subsidiary of a Greek energy company last week. The latest of these attacks occurred on Sunday, targeting the government’s online portal, and was thwarted by a quick and coordinated response by the authorities. Cyprus’ Ministry of Research,…

    Read More

  • CISA, FBI, NSA, and International Partners Warn of Iranian Hackers Targeting Critical Infrastructure

    Cybersecurity and intelligence agencies from Australia, Canada, and the United States have released a joint advisory warning about a year-long campaign undertaken by Iran-linked cyber-attackers to infiltrate critical infrastructure organisations via attacks aimed at obtaining credentials and other information describing the organisations’ networks. Brute-force attacks: A brute-force attack is a type of cyberattack in which an attacker systematically…

    Read More

  • Pokémon Developer Breached: Source Code and Personal Information Leaked

    In yet another crazy fan leak for this year, multiple gigabytes of information including source code and other confidential data related to multiple incarnations of the Nintendo exclusive Pokémon video game series have been leaked online. The leak, dubbed “Teraleak”, seems to be the biggest in Pokémon history. The leaked information is full of easter…

    Read More

  • Hacked Robot Vacuums Yell Racial Slurs at Owners

    Robot Vacuums made by Ecovacs, one of the largest home robotics companies in the world, have reportedly been roving around people’s homes yelling slurs at their owners through the onboard speakers. A critical vulnerability in the company’s software left the robots susceptible to being hacked from afar, allowing attackers to take control of the devices…

    Read More

  • Cyber Attacks Hit Iran’s Nuclear Facilities

    Iran faced major cyber attacks on Saturday, the 12th of October 2024, targeting various government entities including nuclear facilities. The cyber attack follows Israel’s vow to respond to the 200-missile barrage conducted by Iran on the 1st of October amid the ongoing and intensifying conflicts in Gaza and Lebanon. The former secretary of Iran’s Supreme…

    Read More

  • CISA Orders US Federal Agencies to Patch this Fortinet Flaw!

    On the 9th of October, CISA revealed a critical vulnerability in Fortinet’s FortiOS, tracked as CVE-2024-23113, being actively exploited in the wild by attackers to achieve Remote Code Execution(RCE). CISA has since added it to its Known Exploited Vulnerabilities Catalogue and ordered US Federal agencies to patch it within 3 weeks. The root cause of…

    Read More

  • Internet Archives Suffers Breach: 31 Million Affected

    The Wayback Machine of the Internet Archives has been breached by a threat actor who stole a user authentication database containing 31 million unique records from the website. A javascript alert created by the hacker on the compromised website reads, “Have you ever felt like the Internet Archive runs on sticks and is constantly on…

    Read More

  • Blind Trust in LLMs: How Hallucinated Packages Can Compromise Open-Source Projects

    Large Language Models(LLMs) have become essential tools for software developers, helping them solve complex problems and even implement entire functionalities in some cases. However, while these models can accelerate development and streamline workflows, over-reliance on them comes with its own set of risks. A well-known flaw of LLMs is their tendency to ‘hallucinate’—a phenomenon where…

    Read More

  • Pro-Ukraine Hackers Attack Russian Media Company on Putin’s Birthday

    Russian state media company VGTRK, which owns and operates the country’s main national TV stations, has fallen victim to a targeted cyber attack claimed by the Ukrainian government to be orchestrated by hackers based in Kyiv. The attack, which occurred on the 7th of October, caused the company’s website and its 24-hour news live stream…

    Read More

  • Crypto Wallets Targetted Using Malicious PyPI Packages

    PyPI has long been used as a means of distributing malicious code masquerading as legitimate utilities by bad actors. Yehuda Gelb recently exposed one such operation, targeting users of prominent crypto-wallets such as Atomic, Metamask, Exodus, and many more, by uploading multiple packages within a short timeframe to the repository, presenting them as utilities for…

    Read More

  • Linux Printing System Vulnerabilities Lead to Remote Code Execution(RCE)

    A chain of vulnerabilities in the Common UNIX Printing System(CUPS) was recently discovered by security researcher Simone Margaritelli, allowing attackers to execute code remotely on vulnerable machines provided certain conditions are met. CUPS is the most widely used printing system on Linux and other UNIX-like operating systems. It has a myriad of components that work…

    Read More

  • Exploding Pagers and Walkie-Talkies in Lebanon – A Hacker’s Analysis

    Lebanese militant group Hezbollah has had a rough couple of days with communication devices exploding all around them. Thousands of pagers detonated simultaneously in Hezbollah strongholds on Tuesday, the 17th of September, killing 9 and injuring more than 3,000 Lebanese citizens. Among the affected were several Hezbollah fighters as well as Iran’s envoy to Beirut.…

    Read More

  • RAMBO: Stealing Secrets from Isolated Computers

    Background Prominent researcher Mordechai Guri of the Ben-Gurion University of the Negev, Israel, recently released a research paper detailing a new method that allows attackers to steal sensitive information from air-gapped(isolated) computers. Air-gapped systems are systems that are physically separated from external networks, including the Internet. This is achieved by keeping the system disconnected from any wired…

    Read More

  • Revival Hijack: A PyPI Supply Chain Attack Technique.

    Researchers at JFrog have recently discovered a PyPI supply chain attack technique being exploited in the wild, dubbed “Revival Hijack”. This technique can be used to hijack Python packages hosted on PyPI by manipulating the option to re-register(revive) their names once the owner takes them down. A package repository is a centralized storage location for software packages,…

    Read More

  • Transport for London(TFL) is Dealing with an ongoing Cyber Attack!

    London’s transport authority, Transport for London(TFL), is experiencing an ongoing cyber attack. In a statement released on its website, the TFL stated that it is currently dealing with an ongoing cybersecurity incident. TFL’s services are running as usual for now. The agency has assured its customers that it is working with relevant authorities to respond…

    Read More

  • Airport Security Screening can be Bypassed?

    Security researchers Sam Curry and Ian Carrol discovered a vulnerability in an air transport security system which could allow unauthorized individuals to bypass airport security screenings and even gain access to flight cockpits!

    Read More

  • Uber Fined 290 Million Euros for GDPR Violations

    The Dutch Data Protection Authority(DPA) has imposed a fine of 290 Million euros on transport giant Uber for violations of the General Data Protection Regulation(GDPR) in Europe. Uber was found to be transferring the personal data of European taxi drivers to the United States(US) without safeguarding the data being transferred as mandated by the GDPR.…

    Read More

  • The Lay(wo)man’s Guide to Online Security

    Overview The average individual spends 6 hours and 35 minutes of their day on the internet. At least 1/3rd of this time is spent on social media, peering into other people’s lives and giving them peaks into their own. There is however a limit to how much information you can put online without consequence. In…

    Read More

  • NIST’s Post Quantum Encryption Standards 2024

    The National Institute of Standards and Technology(NIST), on the 13th of August 2024, released its principal set of encryption algorithms, designed to withstand attacks from quantum computers. The development of Quantum computing has caused growing concerns about the ability of current encryption standards to maintain their security. Experts claim that most modern encryption standards will be…

    Read More

  • GrimResource: Achieving Command Injection on Windows

    After Microsoft’s well founded decision to disable office macros on files sourced from the internet, one of the most widely used techniques by attackers to deliver malware was disarmed. Spearphishers were sent scrambling to find alternate techniques to gain footholds on victim PCs. Many new techniques have since surfaced to fill the void left by this development, the latest of…

    Read More

  • Everything You Need to Know About the Snowflake Breaches

    Information stealer leaks over the past several years culminated in a series of breaches starting in May this year, involving 165 companies including Ticketmaster, Santander, AT&T, Advance Auto Parts, Anheuser-Busch, and Lending Tree. We will refer to these as the Snowflake breaches. It all started when a threat actor group by the name of ShinyHunters put the…

    Read More

  • ClownStrike: CrowdStrike’s Faulty Update that Broke the Internet

    Global cybersecurity giant CrowdStrike unintentionally became the reason for a massive Denial-of-Service(DoS) last Friday when a routine update to their endpoint security platform Falcon went horribly wrong. A faulty component pushed with the update triggered a logic error in Windows PCs worldwide causing them to get stuck on Blue Screens of Death(BSOD) and in never-ending boot loops. The update contained newly observed malicious pipes being used by common C2 frameworks for…

    Read More

  • Ransomware Group DarkAngels and the Largest Payout Ever

    The DarkAngels ransomware group is a group of threat actors which emerged in May of 2022 and have since been known to have conducted some of the biggest and most successful ransomware attacks in recent times. What makes this group even more impressive is the fact that they have kept such a low profile all this time, only now catching the limelight due to the record breaking payout they just received. According…

    Read More

  • About Us

    Cybersecurity for Everyone Cybersecurity affects everyone. Our purpose is to empower people with the knowledge they need to stay safe and secure online. Hello There! I am Kaval Joshi a.k.a Kr1pt7c, A cybersecurity consultant, security researcher, darknet prowler, and creator of Decrypting. Welcome! Let’s start with why. Why did I start Decrypting? The field of Cybersecurity has a high knowledge barrier. Most people don’t…

    Read More

  • The Ransomware Attack on Synnovis that Broke London Healthcare

    A ransomware attack on pathology and diagnostic service provider Synnovis on the 3rd of June has shaken London’s healthcare system to its core, causing disruptions at multiple major NHS hospitals in London. The Attack Synnovis went live with a Laboratory Information Management System(LIMS) in October of 2023, which combined multiple separate IT systems set up for the NHS-affiliated trusts…

    Read More