• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • The Mental Health & Self-Improvement Bundle for $19

    The Mental Health & Self-Improvement Bundle for $19
  • Lenovo ThinkCentre M900 Tiny Core i5-6500T 16GB 256GB SSD Wi-Fi Windows 10 Pro (Grade A Refurbished) for $199

    Lenovo ThinkCentre M900 Tiny Core i5-6500T 16GB 256GB SSD Wi-Fi Windows 10 Pro (Grade A Refurbished) for $199
  • Apple iPad Pro 9.7" 32GB , Silver (Wi-Fi Only) [A1673] Bundle – Updates to IOS 16 for $199

    Apple iPad Pro 9.7" 32GB , Silver (Wi-Fi Only) [A1673] Bundle – Updates to IOS 16 for $199
  • Microsoft Surface Pro 5, 12.3" 4GB RAM 128GB SSD Windows 10 (Refurbished) for $280

    Microsoft Surface Pro 5, 12.3" 4GB RAM 128GB SSD Windows 10 (Refurbished) for $280
  • Microsoft Surface Pro 6, 12.3" 8GB RAM Windows 10 (Refurbished) for $549

    Microsoft Surface Pro 6, 12.3" 8GB RAM Windows 10 (Refurbished) for $549
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Korea

North Korea Hackers Using New “Dolphin” Backdoor to Spy on South Korean Targets

Nov 30, 2022 by iHash Leave a Comment

The North Korea-linked ScarCruft group has been attributed to a previously undocumented backdoor called Dolphin that the threat actor has used against targets located in its southern counterpart. "The backdoor [...] has a wide range of spying capabilities, including monitoring drives and portable devices and exfiltrating files of interest, keylogging and taking screenshots, and … [Read more...] about North Korea Hackers Using New “Dolphin” Backdoor to Spy on South Korean Targets

U.S. Sanctions Cryptocurrency Mixer Blender for Helping North Korea Launder Millions

May 7, 2022 by iHash Leave a Comment

The U.S. Treasury Department on Friday moved to sanction virtual currency mixer Blender.io, marking the first time a mixing service has been subjected to economic blockades. The move signals continued efforts on the part of the government to prevent North Korea's Lazarus Group from laundering the funds stolen from the unprecedented hack of Ronin Bridge in late March. The newly … [Read more...] about U.S. Sanctions Cryptocurrency Mixer Blender for Helping North Korea Launder Millions

North Korea Exploited VPN Flaw to Hack South’s Nuclear Research Institute

Jun 19, 2021 by iHash Leave a Comment

South Korea's state-run Korea Atomic Energy Research Institute (KAERI) on Friday disclosed that its internal network was infiltrated by suspected attackers operating out of its northern counterpart. The intrusion is said to have taken place on May 14 through a vulnerability in an unnamed virtual private network (VPN) vendor and involved a total of 13 IP addresses, one of which … [Read more...] about North Korea Exploited VPN Flaw to Hack South’s Nuclear Research Institute

North Korean hackers targeting South Korea with RokRat Trojan

Jan 8, 2021 by iHash Leave a Comment

A North Korean hacking group has been found deploying the RokRat Trojan in a new spear-phishing campaign targeting the South Korean government. Attributing the attack to APT37 (aka Starcruft, Ricochet Chollima, or Reaper), Malwarebytes said it identified a malicious document last December that, when opened, executes a macro in memory to install the aforementioned remote access … [Read more...] about North Korean hackers targeting South Korea with RokRat Trojan

Trojanized Security Software Hits South Korea Users in Supply-Chain Attack

Nov 16, 2020 by iHash Leave a Comment

Cybersecurity researchers took the wraps off a novel supply chain attack in South Korea that abuses legitimate security software and stolen digital certificates to distribute remote administration tools (RATs) on target systems. Attributing the operation to the Lazarus Group, also known as Hidden Cobra, Slovak internet security company ESET said the state-sponsored threat actor … [Read more...] about Trojanized Security Software Hits South Korea Users in Supply-Chain Attack

EU sanctions hackers from China, Russia, North Korea who’re wanted by the FBI

Jul 31, 2020 by iHash Leave a Comment

The Council of the European Union has imposed its first-ever sanctions against persons or entities involved in various cyber-attacks targeting European citizens, and its member states.The directive has been issued against six individuals and three entities responsible for or involved in various cyber-attacks, out of which some publicly known are 'WannaCry', 'NotPetya', and … [Read more...] about EU sanctions hackers from China, Russia, North Korea who’re wanted by the FBI

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers

Mar 25, 2023 By iHash

Lenovo ThinkCentre M900 Tiny Core i5-6500T 16GB 256GB SSD Wi-Fi Windows 10 Pro (Grade A Refurbished) for $199

Mar 26, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

The Mental Health & Self-Improvement Bundle for $19

Expires March 26, 2123 23:59 PST Buy now and get 98% off Depression Counseling KEY FEATURES 264 million people, of all ages globally suffer from depression. Chances are you heard of or know somebody who has or is going through a state of depression. If you’re ready to be that helping hand and a person […]

Apple iPad Pro 9.7" 32GB , Silver (Wi-Fi Only) [A1673] Bundle – Updates to IOS 16 for $199

Expires March 20, 2123 23:08 PST Buy now and get 0% off PRODUCT SPECS MPN:MLMP2LL/A , Silver Bundle includes tempered glass preinstalled, black plastic snap-on case, wall charger & lighting cable. Updates to IOS 16 Features a fully-laminated 9.7-inch LED-backlit 2048×1536 (264 ppi, DCI-P3 color gamut) touch-sensitive “Retina” display with dynamic white balance adjusting “True […]

Elastic’s Federal Sales Director Kathy Hsu thinks authenticity is important in sales. Hear why.

Elastic’s Federal Sales Director Kathy Hsu thinks authenticity is important in sales. Hear why.

My passion is to work with the federal government and see how I can be a part of the mission. That’s why I wanted to work at Elastic.  I first discovered my passion for tech sales as a college graduate working in Silicon Valley. I worked at Apple as a Technical Consultant and got my […]

Microsoft Surface Pro 6, 12.3" 8GB RAM Windows 10 (Refurbished) for $549

Expires March 25, 2123 23:59 PST Buy now and get 63% off KEY FEATURES Microsoft offers a powerful and versatile 2-in-1 laptop/tablet with a sleek and portable design, high-performance hardware, and a stunning 12.3-inch PixelSense touchscreen display. With up to 13.5 hours of battery life and the latest 8th generation Intel Core processors, the Surface […]

U.K. National Crime Agency Sets Up Fake DDoS-For-Hire Sites to Catch Cybercriminals

Mar 25, 2023Ravie LakshmananCyber Crime / DDoS Attack In what’s a case of setting a thief to catch a thief, the U.K. National Crime Agency (NCA) revealed that it has created a network of fake DDoS-for-hire websites to infiltrate the online criminal underground. “All of the NCA-run sites, which have so far been accessed by […]

Swift Package Index gains Apple sponsorship

Building a thriving open source ecosystem is important to Swift’s success, and open source packages are the building blocks that help power countless Swift projects. As the number of packages increases, discovery becomes critical for developers needing to find the tools and libraries that help them build their apps and services. Over the last three […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT