Site search

Search results: «hack»

Found matches: 76

Iranian state-backed Seedworm hackers lurk inside US-Israeli critical networks.
#Iran #US #Israel
🔎 What is 𝐘𝐚𝐧𝐝𝐞𝐱 𝐝𝐨𝐫𝐤𝐢𝐧𝐠? (Advanced OSINT Technique)

Most bug hunters know about Google Dorks…

But very few explore the power of Yandex Dorking using Yandex 🔥

Yandex is a Russian search engine that sometimes indexes files and directories that Google ignores — making it extremely powerful for reconnaissance and OSINT.

💡 Why Yandex is Special?

✔️ Different indexing algorithm
✔️ Better exposure of open directories
✔️ Sometimes reveals sensitive files not visible on Google
✔️ Useful for bug bounty & recon

---

🎯 Common Yandex Dork Examples

⚠️ For educational & authorized testing only.

1️⃣ Find Exposed Login Pages...
DieNet targeted vital electronic sites in the Middle East, because it hosted American military bases, and opened its atmosphere to pass Zionist and American planes used to launch attacks on Iran.

The attacks focused on the financial and banking sectors, where banks received Assad's share of the attacks, among these websites that were taken out of service today:

- National Commercial Bank (Saudi Arabia)
- Bank of Riyadh
- Ras Al Khaimah Airport
- Sharjah Airport
E-Government (Kuwait)
- General Authority for Civil Information (Kuwait)
- The General Institute for Social Security Services (Kuwait)
- National Center for Crisis Management...
Protection against DDoS attacks and bots 1.0
Installation: Go to the control panel, open the Alpha installer, upload the archive downloaded after purchase, and install.

The module provides excellent initial protection by blocking excessively frequent requests to website pages. It's also an excellent defense against hacker bots, which scan a website, performing tens of thousands of different combinations to find a way to hack it—this mod prevents such scenarios.
When a page is blocked, the system prompts you to solve a captcha to unlock access. Logging is done in JSON files instead of PHP sessions, further enhancing security. Request verification...
1. Set session expiration (JWT max 7 days + refresh rotation)
2. Never use AI-built auth. Use Clerk, Supabase Auth, or Auth0
3. Never paste API keys into AI chats. Use process.env
4. .gitignore is your first file in every project, not the last
5. Rotate secrets every 90 days minimum
6. Verify every package the AI suggests actually exists before installing
7. Always ask for newer, more secure package versions
8. Run npm audit fix right after building
9. Sanitize every input. Use parameterized queries always
10. Enable Row-Level Security from day one
11. Remove all console.log statements before...
🚨 Iranian fingerprint inside American networks... And hacks that stayed hidden for weeks
Broadcom researchers have uncovered an advanced cyber-spying campaign carried out by the Iran-linked MuddyWater group, after observing its presence within the networks of several companies in the United States without drawing attention for some time.
Technical analysis has shown that attackers used a backdoor based on the Deno environment to run remote commands inside the infected systems, a style that provides high concealment because this environment is less used in traditional malware. Attackers also attempted to transfer data off targeted networks via Rclone tool to cloud storage...