-
8220 Hacker Group Added Hadooken & K4Spreader Tools To Their Arsenal
The 8220 hacker group is known for targeting both Windows and Linux web servers by deploying “crypto-jacking” malware to exploit vulnerabilities. This group reportedly has access to the source code of these OSs, which enhances their ability to carry out attacks via brute force and RCE. Cybersecurity researchers at Sekoia recently discovered that the 8220…
-
Beware Of Fake Google Chrome Update That Delivers Malware
An ongoing fake Google Chrome update effort targeting France has been noticed, which spreads WarmCookie malware via compromised websites. WarmCookie is a Windows malware that is used to obtain system access through phishing operations. It is a two-stage backdoor intended to spread more payloads and examine target networks. It most commonly spreads through phishing efforts…
-
What is Autonomous System? Types, Roles & ASN Definition
The Internet, a vast and intricate network of networks, relies on numerous underlying technologies and protocols to function seamlessly. The concept of an autonomous system (AS) is one critical component that enables the Internet to operate efficiently. In networking, an AS is a collection of IP prefixes under a single administrative domain that maintains a…
-
DIYFPV: A New Home for Drone Builders
If you’re looking to get into flying first-person view (FPV) remote controlled aircraft, there’s an incredible amount of information available online. Seriously, it’s ridiculous. In fact, between the different forums and the countless YouTube videos out there, it can be difficult to sort through the noise and actually find the information you need. What if…
-
2024: As The Hardware World Turns
With 2024 now officially in the history books, it’s time to take our traditional look back and reflect on some of the top trends and stories from the past twelve months as viewed from the unique perspective Hackaday affords us. Thanks to the constant stream of tips and updates we receive from the community, we’ve…
-
Programming Ada: Atomics and Other Low-Level Details
Especially within the world of multi-threaded programming does atomic access become a crucial topic, as multiple execution contexts may seek to access the same memory locations at the same time. Yet the exact meaning of the word ‘atomic’ is also essential here, as there is in fact not just a single meaning of the word…
-
Crafting a Cardboard Tribute to Puzzle Bobble
What do you get when you cross cardboard, deodorant rollers, and a love for retro gaming? A marvel of DIY engineering that brings the arcade classic Puzzle Bobble to life—once again! Do you remember the original Puzzle Bobble aiming mechanism we featured 12 years ago? Now, creator [TomTilly] has returned with a revamped version, blending…
-
Protect Your Site with a DOOM Captcha
We all know that “Can it run DOOM?” is the first question of a hardware hacker. The 1993 first person shooter from id Software defined an entire genre of games, and has since been made open source, appearing on almost everything. Everything, that is, except a Captcha, those annoying “Are you a human” tests where…
-
Broken USB Lamp Saved with a Bit of Woodworking
For many of us, when we think of creating a custom enclosure, our minds immediately go towards our 3D printer. A bit of time in your CAD program of choice, and in an hour (or several), you’ve got a bespoke plastic box. A hacker’s dream come true. But extruded plastic is hardly perfect. For one…
-
Light Brite Turned Sci-Fi Console on the Cheap
Generally, the projects featured on Hackaday actually do something. We won’t go as far as to say they are practical creations, but they usually have some kind of function other than to sit there and blink. But what if just sitting still and blinking away randomly is precisely what you want a piece of hardware to…