- Microsoft admits that hacker Lapsus$ stole the source code

a series of major technology companies in the world are becoming victims of the lapsus$ hacker group. after attacking nvidia, samsung and many other companies, recently this group of hackers also claimed to have successfully hacked microsoft and obtained part of the source code of bing and cortana in a block of data of nearly 37gb.
- Detecting new culprits attacking Windows 10

kaspersky security researchers have discovered a new culprit - puzzlemaker - who used the google chrome and windows 10 zero-day exploit chain in highly targeted attacks against multiple companies all around the world.
- This is a way to prevent hackers from stealing your data when using public Wifi

one advice is to be cautious when browsing the web. never let your curiosity be the cause of unworthy errors. on your browser, block and remove all tracking cookies. especially 'stay away' from unsafe and unknown sources (beware of free software), and stay away from 'suspicious' links sent to your email or links that appear on new feeds social networking sites.
- Stunned because the 'worm' spread via email

symantec's security response department has warned of a new worm w32.imsolk.b@mm that is spreading through e-mail at a dizzying speed, attacking hundreds of thousands of computers around the world.
- Teen hacker is believed to be behind the notorious hacker group Lapsus$

in recent weeks, the lapsus$ hacker group has appeared in the media. security researchers are actively investigating the activities of the lapsus$ hacker group.
- 10 tips to help you avoid hacker trap

using computers is familiar in a modern and vibrant city like hongkong. in 2009, the number of internet-related crimes increased dramatically ...
- Appears a free game that allows you to practice being a hacker

anonymous hacker simulator is a simulation game, allowing you to transform into a professional white hat hacker with the mission to uncover the conspiracy behind the civil data surveillance program of a dark organization.
- Send Email using PHP

php must be configured correctly in the php.ini file with details about how your system sends email. open php.ini available in the / etc / directory and find the section that starts with [mail function].
- Beware of the 7 most common types of spam

email, as we know, is always the most vulnerable object on the internet today. anyone who has ever used email is no stranger to having to spend time 'processing' the spam pile almost regularly.
- Try being a hacker with these 4 hacking simulators!

have you ever imagined yourself in the role of a hacker? one way to do that is through a hacking emulator. through these emulators, you can experience the scenarios and challenges that a hacker faces today.