NsaMag
Menu
  • Home
  • IT Securty News
  • IT Securty Articles
  • Security Magazines
  • About
  • North Korean Kimsuky hackers exposed in alleged data breach

    What’s new: North Korean state-sponsored hackers known as Kimsuky have reportedly experienced a data breach,...
  • Details emerge on WinRAR zero-day attacks that infected PCs with malware

    What’s new: A report has revealed that the Russian hacking group RomCom exploited a zero-day...
  • Microsoft tests cloud-based Windows 365 disaster recovery PCs

    What’s new: Microsoft has launched a limited public preview of Windows 365 Reserve, a service...
  • ‘Chairmen’ of $100 million scam operation extradited to US

    What’s new: Four Ghanaian nationals have been extradited to the U.S. and charged for their...
  • How to restore GPT-4o when you’ve GPT-5

    What’s new: Users of GPT-5 can restore access to GPT-4o by following specific steps, available...

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender

August 6, 2025 nsamag Off IT Securty Articles,

What’s new: Akira ransomware is exploiting the Intel CPU tuning driver 'rwdrv.sys' to disable Microsoft...

Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

August 6, 2025 nsamag Off IT Securty Articles,

What’s new: Researchers have identified a vulnerability in Amazon Elastic Container Service (ECS) named ECScape,...

MFA matters… But it isn’t enough on its own

August 6, 2025 nsamag Off IT Securty Articles,

What’s new: Multi-factor authentication (MFA) is essential for enhancing security, but it is not sufficient...

Hacker extradited to US for stealing $3.3 million from taxpayers

August 6, 2025 nsamag Off IT Securty Articles,

What’s new: Chukwuemeka Victor Amachukwu, a Nigerian national, has been extradited from France to the...

New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations

August 6, 2025 nsamag Off IT Securty Articles,

What’s new: A new command-and-control (C2) evasion method called 'Ghost Calls' has been identified, which...

St. Paul Declares Emergency After Major Cyberattack; AI Malware and Cryptographic Breakthroughs Highlight Evolving Threats

August 5, 2025 nsamag Off IT Securty Articles,

🔐 St. Paul Cyberattack On July 25, 2025, the city of St. Paul, Minnesota was...

AI-generated npm package drains Solana wallets (1,500+ installs)

August 1, 2025 nsamag Off IT Securty Articles,

What’s new: Researchers uncovered @kodane/patch-manager, an AI-generated npm package that hid a stealth wallet drainer...
Conducting a Network Security Audit: A Comprehensive Guide

Conducting a Network Security Audit: A Comprehensive Guide

December 15, 2022 nsamag Off Network Securty,

Conducting a network security audit is an important part of ensuring the safety and integrity...

EXECUTION VULNERABILITY IN THE MICROSOFT WINDOWS JET DATABASE ENGINE

September 24, 2018 nsamag Off Computer Security, Internet Security, IT Securty Articles, IT Securty News, Network Securty,

Cyber security experts from the Zero Day Initiative discovered a vulnerability in the Microsoft JET...
Hacker crashes Google Play Store

Hacker crashes Google Play Store

March 19, 2014 nsamag Off Internet Security, IT Securty News,

Last Weekend Ibrahim Balic, a Turkish hacker crashes Google Play Store twice when he tried...

Posts pagination

Previous 1 2 3 4 Next

Popular Programs

Nsauditor Network Security Auditor
Network Security Auditing for possible vulnerabilities.Over 45 net tools.
Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a hacker might use to attack it.
Buy Now | Download | More

Product Key Explorer
Product Key Explorer recovers product keys from local or network computers
Product Key Explorer is a powerful product key find and product key recovery software for over +10000 software. It recovers product keys from local or network computers.
Buy Now | Download | More

LPR Lost Password Recovery
Recover website, email, social media passwords from most popular web browsers
LPR Lost Password Recovery reveals website, email, social media passwords from Google Chrome, Microsoft Edge and Opera browsers, allows to backup to HTML, CSV, TXT file or copy to clipboard. All features are provided with a user friendly interface.
Buy Now | Download | More

Categories

  • Computer Security
  • Internet Security
  • IT Securty Articles
  • IT Securty News
  • Network Securty

Recent Posts

  • North Korean Kimsuky hackers exposed in alleged data breach
  • Details emerge on WinRAR zero-day attacks that infected PCs with malware
  • Microsoft tests cloud-based Windows 365 disaster recovery PCs
  • ‘Chairmen’ of $100 million scam operation extradited to US
  • How to restore GPT-4o when you’ve GPT-5

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 89 other subscribers

Copyright © 2025 | TechMag designed by Themes4WP