<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>Pakistani Pro Users &#45; Category: Hacking</title>
<link>https://pakweb.pro/rss/category/hacking</link>
<description>Pakistani Pro Users &#45; Hacking</description>
<dc:language>en</dc:language>

<item>
<title>A vulnerability in MediaTek chips allows hacking of switched&#45;off smartphones</title>
<link>https://pakweb.pro/a-vulnerability-in-mediatek-chips-allows-hacking-of-switched-off-smartphones</link>
<guid>https://pakweb.pro/a-vulnerability-in-mediatek-chips-allows-hacking-of-switched-off-smartphones</guid>
<description><![CDATA[ Ledger, a cryptocurrency hardware wallet developer, has discovered a critical vulnerability in Android smartphones equipped with MediaTek processors. According to the researchers, this issue potentially allows attackers to access sensitive user data even when the device is turned off. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202603/img_w860_69b30d9cb35933-99120972.jpg" length="438856" type="image/jpeg"/>
<pubDate>Fri, 13 Mar 2026 00:01:55 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>A developer transferred $24 million worth of cryptocurrency to scammers</title>
<link>https://pakweb.pro/a-developer-transferred-24-million-worth-of-cryptocurrency-to-scammers</link>
<guid>https://pakweb.pro/a-developer-transferred-24-million-worth-of-cryptocurrency-to-scammers</guid>
<description><![CDATA[ Game developer Alex Amsel, known as the blogger Sillytuna, reported that he was brutally attacked and forced to transfer $24 million worth of AUSD stablecoins to them. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202603/img_w860_69ab021feb39f1-66178677.jpg" length="80227" type="image/jpeg"/>
<pubDate>Fri, 06 Mar 2026 21:34:54 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>70% of gaming apps contain high&#45;risk vulnerabilities</title>
<link>https://pakweb.pro/70-of-gaming-apps-contain-high-risk-vulnerabilities</link>
<guid>https://pakweb.pro/70-of-gaming-apps-contain-high-risk-vulnerabilities</guid>
<description><![CDATA[ An analysis of approximately 50 popular mobile gaming apps conducted using the AppSec.Sting tool revealed approximately 700 vulnerabilities. Of these, 90 were classified as high- and critical-level vulnerabilities. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202602/img_w860_698dced1b44812-17363435.jpg" length="367861" type="image/jpeg"/>
<pubDate>Thu, 12 Feb 2026 18:00:29 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Hackers gained access to confidential data from Apple and Nvidia</title>
<link>https://pakweb.pro/hackers-gained-access-to-confidential-data-from-apple-and-nvidia</link>
<guid>https://pakweb.pro/hackers-gained-access-to-confidential-data-from-apple-and-nvidia</guid>
<description><![CDATA[ The Chinese company Luxshare, a key assembler of Apple products, has allegedly suffered a major cyberattack. The ransomware group RansomHub claims to have stolen confidential data from Apple, Nvidia, and other tech giants, threatening to release the information unless ransom is paid. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202602/img_w860_69805cf3d058c5-16132408.jpg" length="363225" type="image/jpeg"/>
<pubDate>Mon, 02 Feb 2026 13:14:52 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Spotify was hacked and information about 86 million audio files was leaked online.</title>
<link>https://pakweb.pro/spotify-was-hacked-and-information-about-86-million-audio-files-was-leaked-online</link>
<guid>https://pakweb.pro/spotify-was-hacked-and-information-about-86-million-audio-files-was-leaked-online</guid>
<description><![CDATA[ A comprehensive database compiled from the Spotify platform has been made publicly available . The information includes metadata for 256 million music tracks and details for 86 million audio files, representing a total data volume of approximately 300 terabytes. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202512/img_w860_694ceb8a4b0155-00957596.jpg" length="210699" type="image/jpeg"/>
<pubDate>Thu, 25 Dec 2025 12:45:21 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Google announces it is injecting AI into malware code.</title>
<link>https://pakweb.pro/google-announces-it-is-injecting-ai-into-malware-code</link>
<guid>https://pakweb.pro/google-announces-it-is-injecting-ai-into-malware-code</guid>
<description><![CDATA[ Google Threat Intelligence Group experts report the emergence of a new type of cyberattack in which attackers inject artificial intelligence into malware code. This allows viruses to adapt to defense systems. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202511/img_w860_69183d7fdfd945-47003448.jpg" length="434290" type="image/jpeg"/>
<pubDate>Sat, 15 Nov 2025 13:44:54 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>80% of phishing attacks use AI</title>
<link>https://pakweb.pro/80-of-phishing-attacks-use-ai</link>
<guid>https://pakweb.pro/80-of-phishing-attacks-use-ai</guid>
<description><![CDATA[ According to Informzashchita , attackers use artificial intelligence in 80% of phishing incidents. In 65% of cases, AI is used to create compelling personalized texts, and in half of attacks, it is used to automate email campaigns, increasing reach hundreds of times. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202510/img_w860_68e0d5f365c8e2-25425153.jpg" length="295873" type="image/jpeg"/>
<pubDate>Sat, 04 Oct 2025 13:09:18 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>ESET has discovered the first malware that generates AI code on the victim&amp;apos;s device</title>
<link>https://pakweb.pro/eset-has-discovered-the-first-malware-that-generates-ai-code-on-the-victims-device</link>
<guid>https://pakweb.pro/eset-has-discovered-the-first-malware-that-generates-ai-code-on-the-victims-device</guid>
<description><![CDATA[ Slovakian company ESET has announced the discovery of the ransomware PromptLock. For the first time, malware uses a locally running AI model to generate scripts directly on the infected computer, potentially opening the way for a new generation of cyber threats. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202509/image_750x_68c846d50a29f.jpg" length="371598" type="image/jpeg"/>
<pubDate>Mon, 15 Sep 2025 22:05:57 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Fraudsters Use Zoom to Hijack Entrepreneurs&amp;apos; Google and Telegram Accounts</title>
<link>https://pakweb.pro/fraudsters-use-zoom-to-hijack-entrepreneurs-google-and-telegram-accounts</link>
<guid>https://pakweb.pro/fraudsters-use-zoom-to-hijack-entrepreneurs-google-and-telegram-accounts</guid>
<description><![CDATA[ Cybersecurity experts are warning of a new attack scenario targeting businesses. Fraudsters posing as potential customers are tricking them into accessing accounts through fake Zoom invitations. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202509/image_750x_68c845d34c913.jpg" length="156676" type="image/jpeg"/>
<pubDate>Mon, 15 Sep 2025 21:59:09 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>76% of successful cyber attacks use malware</title>
<link>https://pakweb.pro/76-of-successful-cyber-attacks-use-malware</link>
<guid>https://pakweb.pro/76-of-successful-cyber-attacks-use-malware</guid>
<description><![CDATA[ A Positive Technologies study found that malware remains the primary tool of cybercriminals. In Q2 2025, it was used in 76% of successful attacks, leading to data leaks (52%) and disruption of business operations (45%). ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202509/image_750x_68c8426d463ab.jpg" length="364417" type="image/jpeg"/>
<pubDate>Mon, 15 Sep 2025 21:45:48 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Botnet attacks increase by 34% in a year</title>
<link>https://pakweb.pro/botnet-attacks-increase-by-34-in-a-year</link>
<guid>https://pakweb.pro/botnet-attacks-increase-by-34-in-a-year</guid>
<description><![CDATA[ According to experts, from January to August 2025, hackers used botnets to scale attacks 34% more often than the same period last year. The most vulnerable sectors were e-commerce, finance and telecommunications. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202509/image_750x_68c841832e85b.jpg" length="382722" type="image/jpeg"/>
<pubDate>Mon, 15 Sep 2025 21:41:35 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Cybercriminals most often disguise malware as Zoom and ChatGPT</title>
<link>https://pakweb.pro/cybercriminals-most-often-disguise-malware-as-zoom-and-chatgpt</link>
<guid>https://pakweb.pro/cybercriminals-most-often-disguise-malware-as-zoom-and-chatgpt</guid>
<description><![CDATA[ Kaspersky Lab experts have found that almost half of the malicious files attacking small and medium businesses in Russia imitate the Zoom application. Attackers also actively use fake versions of ChatGPT and other popular services. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202507/image_750x_6864226d046fd.jpg" length="39192" type="image/jpeg"/>
<pubDate>Tue, 01 Jul 2025 23:01:25 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Fraudsters distribute Trojan under the guise of DeepSeek</title>
<link>https://pakweb.pro/fraudsters-distribute-trojan-under-the-guise-of-deepseek</link>
<guid>https://pakweb.pro/fraudsters-distribute-trojan-under-the-guise-of-deepseek</guid>
<description><![CDATA[ Kaspersky Lab experts have discovered  a phishing site that disguises itself as an official DeepSeek resource and offers to download the DeepSeek-R1 model for Windows. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202506/image_750x_68505edf1d09e.jpg" length="155893" type="image/jpeg"/>
<pubDate>Mon, 16 Jun 2025 23:13:57 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>New Webrat Virus Steals Gamers&amp;apos; Data and Spies Through Webcams</title>
<link>https://pakweb.pro/new-webrat-virus-steals-gamers-data-and-spies-through-webcams</link>
<guid>https://pakweb.pro/new-webrat-virus-steals-gamers-data-and-spies-through-webcams</guid>
<description><![CDATA[ Solar 4RAYS experts have discovered   Webrat malware, which disguises itself as game cheats and pirated software. The virus steals passwords from Steam, Discord, and crypto wallets, and also gives attackers full control over the computer, including access to the camera and screen. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202506/image_750x_68403cf28e87c.jpg" length="126192" type="image/jpeg"/>
<pubDate>Wed, 04 Jun 2025 17:32:57 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>80% of cyber attacks in the Middle East result in data leaks</title>
<link>https://pakweb.pro/80-of-cyber-attacks-in-the-middle-east-result-in-data-leaks</link>
<guid>https://pakweb.pro/80-of-cyber-attacks-in-the-middle-east-result-in-data-leaks</guid>
<description><![CDATA[ Positive Technologies research shows that most successful hacks end with the theft of information: most often, attackers steal credentials (29%), trade secrets (29%) and personal data (20%). ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202505/image_750x_681b4238a863b.jpg" length="276984" type="image/jpeg"/>
<pubDate>Wed, 07 May 2025 16:21:39 +0500</pubDate>
<dc:creator>Rehmatullah</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>WinRAR Under Threat: New Vulnerability Bypasses Windows Protection</title>
<link>https://pakweb.pro/winrar-under-threat-new-vulnerability-bypasses-windows-protection</link>
<guid>https://pakweb.pro/winrar-under-threat-new-vulnerability-bypasses-windows-protection</guid>
<description><![CDATA[ The Russian Ministry of Internal Affairs warns users about a critical vulnerability in the popular WinRAR archiver, which allows attackers to surreptitiously inject malicious code, bypassing built-in Windows security mechanisms. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202504/image_750x_67f506141b685.jpg" length="166239" type="image/jpeg"/>
<pubDate>Tue, 08 Apr 2025 16:18:48 +0500</pubDate>
<dc:creator>Basit Ali</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Over 250 WordPress Attacks: BI.ZONE Discovers New Wave of Cyber ​​Threats</title>
<link>https://pakweb.pro/over-250-wordpress-attacks-bizone-discovers-new-wave-of-cyber-threats</link>
<guid>https://pakweb.pro/over-250-wordpress-attacks-bizone-discovers-new-wave-of-cyber-threats</guid>
<description><![CDATA[ BI.ZONE experts have recorded over 250 cyberattacks on commercial and government organizations using WordPress. The surge in cybercriminal activity is associated with exploitation of vulnerabilities in must-use CMS plugins, allowing the introduction of malicious code and the creation of backdoors to access corporate systems. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202504/image_750x_67f3cb84ac4da.jpg" length="182466" type="image/jpeg"/>
<pubDate>Mon, 07 Apr 2025 17:56:41 +0500</pubDate>
<dc:creator>Basit Ali</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>7% of Netflix, Roblox, and Discord Account Leaks Were Registered to Corporate Email</title>
<link>https://pakweb.pro/7-of-netflix-roblox-and-discord-account-leaks-were-registered-to-corporate-email</link>
<guid>https://pakweb.pro/7-of-netflix-roblox-and-discord-account-leaks-were-registered-to-corporate-email</guid>
<description><![CDATA[ Kaspersky Lab found that 7% of compromised Netflix, Roblox, and Discord accounts were registered to corporate email. This increases the risk for businesses, especially when using the same passwords. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202503/image_750x_67d03f3a7433f.jpg" length="235591" type="image/jpeg"/>
<pubDate>Tue, 11 Mar 2025 18:48:47 +0500</pubDate>
<dc:creator>Basit Ali</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Hackers Stopped the US Supreme Court: Attackers Not Found</title>
<link>https://pakweb.pro/hackers-stopped-the-us-supreme-court-attackers-not-found</link>
<guid>https://pakweb.pro/hackers-stopped-the-us-supreme-court-attackers-not-found</guid>
<description><![CDATA[ A ransomware attack on 36 Los Angeles County Superior Courts has forced the courts to suspend operations, the California Supreme Court press service reported Tuesday . ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202407/image_750x_66a3f47c83e2a.jpg" length="264336" type="image/jpeg"/>
<pubDate>Fri, 26 Jul 2024 16:09:56 +0500</pubDate>
<dc:creator>Basit Ali</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Leidos suffered from hackers: documents of IT supplier to NASA and Pentagon leaked online</title>
<link>https://pakweb.pro/leidos-suffered-from-hackers-documents-of-it-supplier-to-nasa-and-pentagon-leaked-online</link>
<guid>https://pakweb.pro/leidos-suffered-from-hackers-documents-of-it-supplier-to-nasa-and-pentagon-leaked-online</guid>
<description><![CDATA[ Documents from the American company Leidos have been found in the public domain. The company&#039;s analysts suspect that they could have been stolen due to a breach in the Diligent Corp system, Bloomberg reports . ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202407/image_750x_66a3f2dd98e66.jpg" length="322874" type="image/jpeg"/>
<pubDate>Fri, 26 Jul 2024 16:03:09 +0500</pubDate>
<dc:creator>Basit Ali</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Massive Dell data leak affected 49 million users</title>
<link>https://pakweb.pro/massive-dell-data-leak-affected-49-million-users</link>
<guid>https://pakweb.pro/massive-dell-data-leak-affected-49-million-users</guid>
<description><![CDATA[ Massive Dell data leak affected 49 million users . The company began sending out notifications that an attacker had managed to gain unauthorized access to the online portal. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202405/image_750x_663f842fecace.jpg" length="295253" type="image/jpeg"/>
<pubDate>Sat, 11 May 2024 11:44:09 +0500</pubDate>
<dc:creator>Basit Ali</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Apple warns iPhone users about spyware attack</title>
<link>https://pakweb.pro/apple-warns-iphone-users-about-spyware-attack</link>
<guid>https://pakweb.pro/apple-warns-iphone-users-about-spyware-attack</guid>
<description><![CDATA[ Apple warned users in 92 countries that they could be the target of spyware. The company also updated its iPhone support document to include information about how threat notifications work and tips for those who may have been victimized. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202404/image_750x_661ce66187ae8.jpg" length="255616" type="image/jpeg"/>
<pubDate>Mon, 15 Apr 2024 05:33:50 +0500</pubDate>
<dc:creator>Basit Ali</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Hackers use Midjourney brand to steal data</title>
<link>https://pakweb.pro/hackers-use-midjourney-brand-to-steal-data</link>
<guid>https://pakweb.pro/hackers-use-midjourney-brand-to-steal-data</guid>
<description><![CDATA[ Bitdefender has identified a new hacker group using fake social media pages to distribute malware under the guise of Midjourney. Although the page advertised an AI product, clicking on the download link activated the infostealer. ]]></description>
<enclosure url="https://pakweb.pro/uploads/images/202404/image_750x_661ce02cad451.jpg" length="511239" type="image/jpeg"/>
<pubDate>Mon, 15 Apr 2024 05:07:20 +0500</pubDate>
<dc:creator>Basit Ali</dc:creator>
<media:keywords></media:keywords>
</item>

</channel>
</rss>