DEV Community

Cover image for Modern Ways to Hack a Website
Blackie
Blackie

Posted on • Updated on

Modern Ways to Hack a Website

Top 12 Articles about modern Threats

Hi Hackers!, Buckle up, Let's learn about web security ⚔️ with top 12 articles about modern threats and how to secure your websites and apps.

  1. Zero-Day Warning: It's Possible to Hack iPhones Just by Sending Emails

    Default mail app on millions of iPhone and iPad has been found vulnerable to two critical zero-day vulnerabilities.

    favicon thehackernews.com

    The default mailing app pre-installed on millions of iPhones and iPads has been found vulnerable to two critical flaws that attackers are exploiting in the wild, at least, from the last two years to spy on high-profile victims.
    By The Hacker News

  2. Amazon, Cisco And IBM Are Just Three Of Many Tech Giants Whose Software Is Vulnerable To ‘Master Key’ Hacks

    A weakness in widely used app-logging code allows for easy remote hacks on vulnerable servers. Amazon and Microsoft are two of the biggest software makers rushing to warn customers, though the list of affected companies grows by the day.

    favicon forbes.com
  3. The Log4J Vulnerability Will Haunt the Internet for Years | WIRED

    Hundreds of millions of devices are likely affected.

    favicon wired.com
  4. New Hacker Group 'GambleForce' Tageting APAC Firms Using SQL Injection Attacks

    A new hacker group, GambleForce, is behind a string of SQL injection attacks across Asia-Pacific. Learn how they use basic techniques to steal sensiti

    favicon thehackernews.com
  5. XSS Attack: 3 Real Life Attacks and Code Examples

    Learn what an XSS attack looks like - how XSS impacted leading organizations, and how an attack works with code examples.

    favicon brightsec.com
  6. 'Ultimate' MiTM Attack Steals $1M from Israeli Startup | Threatpost

    Researchers uncovers “ultimate man-in-the-middle attack” that used an elaborate spoofing campaign to fool a Chinese VC firm and rip off an emerging business.

    favicon threatpost.com
  7. Hackers Flood NPM with Bogus Packages Causing a DoS Attack

    npm Repository Hit by DoS Attack! Bogus packages flood the open-source ecosystem, causing service instability & spreading malware. Keep your system s

    favicon thehackernews.com
  8. Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks

    Gcore's customer faced two massive DDoS attacks peaking at 1.1 and 1.6 Tbps. Discover the attacker's strategies and how Gcore defended against them.

    favicon thehackernews.com
  9. One of the Most Powerful DDoS Attacks Ever Hits a Crypto Platform | WIRED

    The onslaught was delivered through HTTPS, which puts more strain on a target, and it suggests that attackers are getting more powerful.

    favicon wired.com
  10. The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of - Cyber Defense Magazine

    By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business The rise of DDoS attacks is old news. Now, these attacks are becoming more dangerous, targeted, and detrimental as they evolve. As DDoS attacks become

    favicon cyberdefensemagazine.com

☕ Enjoyed this article? Support my work with a coffee: https://www.buymeacoffee.com/cqvuesleq

Also open for technical writing and frontend dev roles!

Top comments (0)