Posts

Showing posts from March, 2021

Android's new Bluetooth stack rewrite (Gabeldorsh) is written with Rust

Android's new Bluetooth stack rewrite (Gabeldorsh) is written with Rust 491 by nicoburns | 305 comments on Hacker News.

Inside a viral website

Inside a viral website 622 by panic | 244 comments on Hacker News.

Unsplash is being acquired by Getty Images

Unsplash is being acquired by Getty Images 550 by baptlac | 263 comments on Hacker News.

Decided to move on from your NGAV/EDR? A Guide for Small Security Teams to What's Next

Image
You're fully aware of the need to stop threats at the front door and then hunt any that got through that first gate, so your company installed an EPP/ EDR solution. But like most companies, you've already come across its shortcoming – and these are amplified since you have a small security team. More than likely, you noticed that it has its share of detection blind spots and limitations for from The Hacker News https://ift.tt/2PlOpz2 via IFTTT

Hackers are implanting multiple backdoors at industrial targets in Japan

Image
Cybersecurity researchers on Tuesday disclosed details of a sophisticated campaign that deploys malicious backdoors for the purpose of exfiltrating information from a number of industry sectors located in Japan. Dubbed "A41APT" by Kaspersky researchers, the findings delve into a new slew of attacks undertaken by APT10 (aka Stone Panda or Cicada) using previously undocumented malware to deliver from The Hacker News https://ift.tt/3rFZWWW via IFTTT

Google collects 20 times more telemetry from Android devices than Apple from iOS

Google collects 20 times more telemetry from Android devices than Apple from iOS 556 by gormandizer | 290 comments on Hacker News.

Let’s fix font size

Let’s fix font size 541 by rhabarba | 208 comments on Hacker News.

'Fake' Amazon workers defend company on Twitter

'Fake' Amazon workers defend company on Twitter 652 by alexrustic | 319 comments on Hacker News.

Voltswagen of America

Voltswagen of America 534 by throwaway4good | 533 comments on Hacker News.

Ubiquiti starts serving ads in their management interface

Ubiquiti starts serving ads in their management interface 607 by andremedeiros | 306 comments on Hacker News.

Gallup: U.S. church membership dips below 50% for first time

Gallup: U.S. church membership dips below 50% for first time 683 by cwwc | 1357 comments on Hacker News.

I made an eInk newspaper

I made an eInk newspaper 537 by graiz | 210 comments on Hacker News.

Whistleblower: Ubiquiti Breach “Catastrophic”

Whistleblower: Ubiquiti Breach “Catastrophic” 772 by parsecs | 352 comments on Hacker News.

MobiKwik Suffers Major Breach — KYC Data of 3.5 Million Users Exposed

Image
Popular Indian mobile payments service MobiKwik on Monday came under fire after 8.2 terabytes (TB) of data belonging to millions of its users began circulating on the dark web in the aftermath of a major data breach that came to light earlier this month. The leaked data includes sensitive personal information such as:customer names,hashed passwords,email addresses,residential addresses,GPS from The Hacker News https://ift.tt/3rzufyw via IFTTT

Moderna mRNA sequence released to GitHub [pdf]

Moderna mRNA sequence released to GitHub [pdf] 723 by aty268 | 231 comments on Hacker News.

The Deno Company

The Deno Company 692 by elisee | 354 comments on Hacker News.

Suez Canal says traffic in channel resumes after stranded ship refloated

Suez Canal says traffic in channel resumes after stranded ship refloated 668 by WJW | 357 comments on Hacker News.

Flaws in Ovarro TBox RTUs Could Open Industrial Systems to Remote Attacks

Image
As many as five vulnerabilities have been uncovered in Ovarro's TBox remote terminal units (RTUs) that, if left unpatched, could open the door for escalating attacks against critical infrastructures, like remote code execution and denial-of-service. "Successful exploitation of these vulnerabilities could result in remote code execution, which may cause a denial-of-service condition," the U.S. from The Hacker News https://ift.tt/3rAUmoK via IFTTT

New Bugs Could Let Hackers Bypass Spectre Attack Mitigations On Linux Systems

Image
Cybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory. Discovered by Piotr Krysiuk of Symantec's Threat Hunter team, the flaws — tracked as CVE-2020-27170 and CVE-2020-27171 (CVSS from The Hacker News https://ift.tt/3wb0ojF via IFTTT

How to Effectively Prevent Email Spoofing Attacks in 2021?

Image
Email spoofing is a growing problem for an organization's security. Spoofing occurs when a hacker sends an email that appears to have been sent from a trusted source/domain. Email spoofing is not a new concept. Defined as "the forgery of an email address header to make the message appear as if it was sent from a person or location other than the actual sender," it has plagued brands for decades. from The Hacker News https://ift.tt/3tZKBlN via IFTTT

PHP's Git Server Hacked to Insert Secret Backdoor to Its Source code

Image
In yet another instance of a software supply chain attack, someone hacked the official Git server of the PHP programming language and pushed unauthorized updates to insert a secret backdoor into its source code. The two malicious commits were pushed to the self-hosted "php-src" repository hosted on the git.php.net server, illicitly using the names of Rasmus Lerdorf, the author of the programming from The Hacker News https://ift.tt/3rupZjJ via IFTTT

Female Founder Secrets: Men Clamming Up

Female Founder Secrets: Men Clamming Up 563 by femfosec | 749 comments on Hacker News.

In Stockholm there's currently an IT battle underway

In Stockholm there's currently an IT battle underway 535 by div3rs3 | 224 comments on Hacker News.

Employees are happier when led by people with deep expertise (2016)

Employees are happier when led by people with deep expertise (2016) 667 by mgh2 | 193 comments on Hacker News.

Apt Encounters of the Third Kind

Apt Encounters of the Third Kind 663 by lormayna | 142 comments on Hacker News.

Louvre makes its entire collection available online

Louvre makes its entire collection available online 703 by colinprince | 147 comments on Hacker News.

Watch Out! That Android System Update May Contain A Powerful Spyware

Image
Researchers have discovered a new information-stealing trojan, which targets Android devices with an onslaught of data-exfiltration capabilities — from collecting browser searches to recording audio and phone calls. While malware on Android has previously taken the guise of copycat apps, which go under names similar to legitimate pieces of software, this sophisticated new malicious app from The Hacker News https://ift.tt/3rAYHsl via IFTTT

Apple Issues Urgent Patch Update for Another Zero‑Day Under Attack

Image
Merely weeks after releasing out-of-band patches for iOS, macOS, and watchOS, Apple has released yet another security update for iPhone, iPad, Apple Watch to fix a critical zero-day weakness that it says is being actively exploited in the wild. Tracked as CVE-2021-1879, the vulnerability relates to a WebKit flaw that could enable adversaries to process maliciously crafted web content that may from The Hacker News https://ift.tt/3rrGf56 via IFTTT

Only Google is really allowed to crawl the web

Only Google is really allowed to crawl the web 697 by skinkestek | 263 comments on Hacker News.

Permission.site

Permission.site 576 by valand | 147 comments on Hacker News.

OpenSSL Releases Patches for 2 High-Severity Security Vulnerabilities

Image
The maintainers of OpenSSL have released a fix for two high-severity security flaws in its software that could be exploited to carry out denial-of-service (DoS) attacks and bypass certificate verification. Tracked as CVE-2021-3449 and CVE-2021-3450, both the vulnerabilities have been resolved in an update (version OpenSSL 1.1.1k) released on Thursday. While CVE-2021-3449 affects all OpenSSL from The Hacker News https://ift.tt/3dbj0Ho via IFTTT

The Drivers Cooperative

The Drivers Cooperative 550 by pasquinelli | 226 comments on Hacker News.

Phones and apps reduce your ability to focus even when they don’t distract you

Phones and apps reduce your ability to focus even when they don’t distract you 500 by wgoto | 197 comments on Hacker News.

New 5G Flaw Exposes Priority Networks to Location Tracking and Other Attacks

Image
New research into 5G architecture has uncovered a security flaw in its network slicing and virtualized network functions that could be exploited to allow data access and denial of service attacks between different network slices on a mobile operator's 5G network. AdaptiveMobile shared its findings with the GSM Association (GSMA) on February 4, 2021, following which the weaknesses were from The Hacker News https://ift.tt/3u12d0F via IFTTT

Another Critical RCE Flaw Discovered in SolarWinds Orion Platform

Image
IT infrastructure management provider SolarWinds on Thursday released a new update to its Orion networking monitoring tool with fixes for four security vulnerabilities, counting two weaknesses that could be exploited by an authenticated attacker to achieve remote code execution (RCE). Chief among them is a JSON deserialization flaw that allows an authenticated user to execute arbitrary code via from The Hacker News https://ift.tt/3tXYOQi via IFTTT

Is that ship still stuck?

Is that ship still stuck? 539 by ColinWright | 552 comments on Hacker News.

All my servers have an 8 GB empty file on disk

All my servers have an 8 GB empty file on disk 602 by sonicrocketman | 370 comments on Hacker News.

Do you really want Linux phones

Do you really want Linux phones 490 by JetSpiegel | 523 comments on Hacker News.

RIP Google Reader

RIP Google Reader 555 by mrbbk | 307 comments on Hacker News.

SQLite is not a toy database

SQLite is not a toy database 529 by nalgeon | 194 comments on Hacker News.

Black Kingdom Ransomware Hunting Unpatched Microsoft Exchange Servers

Image
More than a week after Microsoft released a one-click mitigation tool to mitigate cyberattacks targeting on-premises Exchange servers, the company disclosed that patches have been applied to 92% of all internet-facing servers affected by the ProxyLogon vulnerabilities. The development, a 43% improvement from the previous week, caps off a whirlwind of espionage and malware campaigns that hit from The Hacker News https://ift.tt/39gMFhn via IFTTT

Forcing Self-Service Password Reset (SSPR) Registration to Increase ROI

Image
When your organization invests in a new product or service, it is essential that you take advantage of all the features it has to offer. This will help you to maximize your return on investment (ROI). If you have purchased or are thinking about purchasing a self-service password reset (SSPR) tool, one of the most important things you will need to do is make sure that 100% of users are registered from The Hacker News https://ift.tt/39vTg7R via IFTTT

Critical Cisco Jabber Bug Could Let Attackers Hack Remote Systems

Image
Cisco on Wednesday released software updates to address multiple vulnerabilities affecting its Jabber messaging clients across Windows, macOS, Android, and iOS. Successful exploitation of the flaws could permit an "attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a from The Hacker News https://ift.tt/39erU5K via IFTTT

Chinese Hackers Used Facebook to Hack Uighur Muslims Living Abroad

Image
Facebook may be banned in China, but the company on Wednesday said it has disrupted a network of bad actors using its platform to target the Uyghur community and lure them into downloading malicious software that would allow surveillance of their devices. "They targeted activists, journalists and dissidents predominantly among Uyghurs from Xinjiang in China primarily living abroad in Turkey, from The Hacker News https://ift.tt/3rnZkFg via IFTTT

The solution of the Zodiac killer’s 340-character cipher

The solution of the Zodiac killer’s 340-character cipher 457 by 0-_-0 | 105 comments on Hacker News.

Show HN: I wrote a book about Go

Show HN: I wrote a book about Go 460 by maximilienandi | 92 comments on Hacker News.

Reddit’s most popular subreddits go private in protest against ‘censorship’

Reddit’s most popular subreddits go private in protest against ‘censorship’ 449 by LordAtlas | 400 comments on Hacker News.

'Do Not Split': A Hong Kong protest film [video]

'Do Not Split': A Hong Kong protest film [video] 422 by lawrenceyan | 174 comments on Hacker News.

Microsoft in talks to buy Discord for more than $10B

Microsoft in talks to buy Discord for more than $10B 399 by meibo | 460 comments on Hacker News.

Substack's UI and 1Password temporarily cost me $2k

Substack's UI and 1Password temporarily cost me $2k 505 by tomahony | 259 comments on Hacker News.

Early-Retirement Update

Early-Retirement Update 434 by dkarp | 426 comments on Hacker News.

Google Removed ClearURLs Extension from Chrome Web Store

Google Removed ClearURLs Extension from Chrome Web Store 628 by URfejk | 271 comments on Hacker News.

Suez canal blocked by a massive ship

Suez canal blocked by a massive ship 663 by tilolebo | 231 comments on Hacker News.

Purple Fox Rootkit Can Now Spread Itself to Other Windows Computers

Image
Purple Fox, a Windows malware previously known for infecting machines by using exploit kits and phishing emails, has now added a new technique to its arsenal that gives it worm-like propagation capabilities. The ongoing campaign makes use of a "novel spreading technique via indiscriminate port scanning and exploitation of exposed SMB services with weak passwords and hashes," according to  from The Hacker News https://ift.tt/3chsUIl via IFTTT

Chrome’s address bar will use https:// by default

Chrome’s address bar will use https:// by default 572 by feross | 387 comments on Hacker News.

Reddit is banning any Aimee Challenor mention. UK public figure and Reddit admin

Reddit is banning any Aimee Challenor mention. UK public figure and Reddit admin 567 by 9387367 | 292 comments on Hacker News.

Plan 9 from Bell Labs in Cyberspace

Plan 9 from Bell Labs in Cyberspace 581 by __d | 133 comments on Hacker News.

The S in IoT is for Security

The S in IoT is for Security 554 by rauhl | 278 comments on Hacker News.

Critical Flaws Affecting GE's Universal Relay Pose Threat to Electric Utilities

Image
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of critical security shortcomings in GE's Universal Relay (UR) family of power management devices. "Successful exploitation of these vulnerabilities could allow an attacker to access sensitive information, reboot the UR, gain privileged access, or cause a denial-of-service condition," the agency said in an advisory from The Hacker News https://ift.tt/3rmpo3T via IFTTT

Crystal 1.0 – What to expect

Crystal 1.0 – What to expect 548 by mfkp | 204 comments on Hacker News.

WARNING: A New Android Zero-Day Vulnerability Is Under Active Attack

Image
Google has disclosed that a now-patched vulnerability affecting Android devices that use Qualcomm chipsets is being weaponized by attackers to launch targeted attacks. Tracked as CVE-2020-11261 (CVSS score 8.4), the flaw concerns an "improper input validation" issue in Qualcomm's Graphics component that could be exploited to trigger memory corruption when an attacker-engineered app requests from The Hacker News https://ift.tt/3lHDWK2 via IFTTT

Why the Wuhan lab leak theory shouldn't be dismissed

Why the Wuhan lab leak theory shouldn't be dismissed 456 by ruaraidh | 434 comments on Hacker News.

The absolute worst scenario happened

The absolute worst scenario happened 499 by logronoide | 449 comments on Hacker News.

Live feed from Iceland erupting volcano [video]

Live feed from Iceland erupting volcano [video] 526 by lknik | 134 comments on Hacker News.

Firefox 87 trims HTTP Referrers by default to protect user privacy

Firefox 87 trims HTTP Referrers by default to protect user privacy 576 by twapi | 142 comments on Hacker News.

Popular Netop Remote Learning Software Found Vulnerable to Hacking

Image
Cybersecurity researchers on Sunday disclosed multiple critical vulnerabilities in remote student monitoring software Netop Vision Pro that a malicious attacker could abuse to execute arbitrary code and take over Windows computers. "These findings allow for elevation of privileges and ultimately remote code execution which could be used by a malicious attacker within the same network to gain from The Hacker News https://ift.tt/3f3pjiJ via IFTTT

GPT Neo: open-source GPT model, with pretrained 1.3B & 2.7B weight models

GPT Neo: open-source GPT model, with pretrained 1.3B & 2.7B weight models 461 by pizza | 104 comments on Hacker News.

Richard Stallman is coming back to the board of the FSF

Richard Stallman is coming back to the board of the FSF 469 by wrycoder | 398 comments on Hacker News.

Critical RCE Vulnerability Found in Apache OFBiz ERP Software—Patch Now

Image
The Apache Software Foundation on Friday addressed a high severity vulnerability in Apache OFBiz that could have allowed an unauthenticated adversary to remotely seize control of the open-source enterprise resource planning (ERP) system. Tracked as CVE-2021-26295, the flaw affects all versions of the software prior to 17.12.06 and employs an "unsafe deserialization" as an attack vector to permit from The Hacker News https://ift.tt/3sdDBkH via IFTTT

Backblaze submitting names and sizes of files in B2 buckets to Facebook

Backblaze submitting names and sizes of files in B2 buckets to Facebook 447 by celsoazevedo | 172 comments on Hacker News.

The Invention of a New Pasta Shape

The Invention of a New Pasta Shape 431 by dgellow | 175 comments on Hacker News.

Don't End the Week with Nothing (2014)

Don't End the Week with Nothing (2014) 529 by mooreds | 142 comments on Hacker News.

Nobody designs for small iPhone devices anymore

Nobody designs for small iPhone devices anymore 458 by dirtylowprofile | 255 comments on Hacker News.

Undocumented x86 instructions in Intel CPUs that can modify microcode

Undocumented x86 instructions in Intel CPUs that can modify microcode 429 by BlackLotus89 | 130 comments on Hacker News.

Cookie Consent Speed Running Game

Cookie Consent Speed Running Game 475 by bigdatagirl | 170 comments on Hacker News.

Docker for Mac M1 RC

Docker for Mac M1 RC 440 by mikkelam | 334 comments on Hacker News.

Nyxt Browser

Nyxt Browser 508 by wglb | 118 comments on Hacker News.

Demoscene accepted as UNESCO cultural heritage in Germany

Demoscene accepted as UNESCO cultural heritage in Germany 618 by quakeguy | 87 comments on Hacker News.

Critical F5 BIG-IP Bug Under Active Attacks After PoC Exploit Posted Online

Image
Almost 10 days after application security company F5 Networks released patches for critical vulnerabilities in its BIG-IP and BIG-IQ products, adversaries have begun opportunistically mass scanning and targeting exposed and unpatched networking devices to break into enterprise networks. News of in the wild exploitation development comes on the heels of a proof-of-concept exploit code that from The Hacker News https://ift.tt/3tG77jy via IFTTT

Click

Click 643 by st_goliath | 180 comments on Hacker News.

Duke Nukem 3D Mirror Universe

Duke Nukem 3D Mirror Universe 574 by tosh | 164 comments on Hacker News.

Young female Japanese biker is 50-year-old man using FaceApp

Young female Japanese biker is 50-year-old man using FaceApp 541 by amrrs | 331 comments on Hacker News.

Tesla Ransomware Hacker Pleads Guilty; Swiss Hacktivist Charged for Fraud

Image
The U.S. Department of Justice yesterday announced updates on two separate cases involving cyberattacks—a Swiss hacktivist and a Russian hacker who planned to plant malware in the Tesla company. A Swiss hacker who was involved in the intrusion of cloud-based surveillance firm Verkada and exposed camera footage from its customers was charged by the U.S. Department of Justice (DoJ) on Thursday from The Hacker News https://ift.tt/3eXgGXc via IFTTT

We found and fixed a rare race condition in our session handling

We found and fixed a rare race condition in our session handling 495 by todsacerdoti | 153 comments on Hacker News.

Hackers Infecting Apple App Developers With Trojanized Xcode Projects

Image
Cybersecurity researchers on Thursday disclosed a new attack wherein threat actors are leveraging Xcode as an attack vector to compromise Apple platform developers with a backdoor, adding to a growing trend that involves targeting developers and researchers with malicious attacks. Dubbed "XcodeSpy," the trojanized Xcode project is a tainted version of a legitimate, open-source project available from The Hacker News https://ift.tt/2P5Jm5t via IFTTT

New Zoom Screen-Sharing Bug Lets Other Users Access Restricted Apps

Image
A newly discovered glitch in Zoom's screen sharing feature can accidentally leak sensitive information to other attendees in a call, according to the latest findings. Tracked as CVE-2021-28133, the unpatched security vulnerability makes it possible to reveal contents of applications that are not shared, but only briefly, thereby making it harder to exploit it in the wild. It's worth pointing out from The Hacker News https://ift.tt/3bWXdE2 via IFTTT

Interview with CEO of rsync.net: “no firewalls and no routers”

Interview with CEO of rsync.net: “no firewalls and no routers” 423 by dmytton | 228 comments on Hacker News.

Show HN: Sorted CSS Colors – Sort the named CSS colors in a nice way

Show HN: Sorted CSS Colors – Sort the named CSS colors in a nice way 415 by knuptfad | 133 comments on Hacker News.

Indiana Jones and the Last Crusade EGA/VGA Comparison

Indiana Jones and the Last Crusade EGA/VGA Comparison 414 by ingve | 138 comments on Hacker News.

WallStreetBets members adopt 3,500 gorillas in six days

WallStreetBets members adopt 3,500 gorillas in six days 538 by ptype | 234 comments on Hacker News.

Critical RCE Flaw Reported in MyBB Forum Software—Patch Your Sites

Image
A pair of critical vulnerabilities in a popular bulletin board software called MyBB could have been chained together to achieve remote code execution (RCE) without the need for prior access to a privileged account. The flaws, which were discovered by independent security researchers Simon Scannell and Carl Smith, were reported to the MyBB Team on February 22, following which it released an from The Hacker News https://ift.tt/3qX6EYb via IFTTT

Focalboard – a self-hosted alternative to Trello, Notion, and Asana

Focalboard – a self-hosted alternative to Trello, Notion, and Asana 491 by stanislavb | 137 comments on Hacker News.

How to Successfully Pursue a Career in Malware Analysis

Image
Are you looking to becoming a malware analyst? Then continue reading to discover how to gain the training you need and start a career in malware analysis career.Did you know that new malware is released every seven seconds? As more and more systems become reliant on the internet, the proliferation of malware becomes increasingly destructive. Once upon a time, a computer virus might cause from The Hacker News https://ift.tt/38SSOA8 via IFTTT

Why Cached Credentials Can Cause Account Lockouts and How to Stop it

Image
When a user account becomes locked out, the cause is often attributed to a user who has simply entered an old or incorrect password too many times. However, this is far from being the only thing that can cause an account to become locked. Another common cause, for example, is an application or script that is configured to log into the system using an old password. Perhaps the most easily from The Hacker News https://ift.tt/3tKRgQP via IFTTT

Google Reveals What Personal Data Chrome and It's Apps Collect On You

Image
Privacy-focused search engine DuckDuckGo called out rival Google for "spying" on users after the search giant updated its flagship app to spell out the exact kinds of information it collects for personalization and marketing purposes. "After months of stalling, Google finally revealed how much personal data they collect in Chrome and the Google app. No wonder they wanted to hide it," the company from The Hacker News https://ift.tt/3cNwpVS via IFTTT

Manim – an animation engine for explanatory math videos

Manim – an animation engine for explanatory math videos 490 by vermilingua | 30 comments on Hacker News.

Flaws in Two Popular WordPress Plugins Affect Over 7 Million Websites

Image
Researchers have disclosed vulnerabilities in multiple WordPress plugins that, if successfully exploited, could allow an attacker to run arbitrary code and take over a website in certain scenarios. The flaws were uncovered in Elementor, a website builder plugin used on more than seven million sites, and WP Super Cache, a tool used to serve cached pages of a WordPress site. According to Wordfence from The Hacker News https://ift.tt/2NucDpZ via IFTTT

Audacity 3.0

Audacity 3.0 442 by app4soft | 80 comments on Hacker News.

Charts.css

Charts.css 426 by pspeter3 | 82 comments on Hacker News.

Milky Way, 12 years, 1250 hours of exposures and 125 x 22 degrees of sky

Milky Way, 12 years, 1250 hours of exposures and 125 x 22 degrees of sky 408 by giuliomagnifico | 83 comments on Hacker News.

Google Play service fee reduced to 15% for the first $1M/year

Google Play service fee reduced to 15% for the first $1M/year 417 by h43k3r | 276 comments on Hacker News.

Moore's Law for Everything

Moore's Law for Everything 392 by icey | 495 comments on Hacker News.

Ask HN: What are some “10x” software product innovations you have experienced?

Ask HN: What are some “10x” software product innovations you have experienced? 402 by pramodbiligiri | 739 comments on Hacker News. Peter Thiel has written about the "10x rule" for startups, where your innovation has to be 10 times better than the second best option [1]. Have you personally experienced such 10x improvements in your own interactions with software? What were they? [1] - https://ift.tt/2DgSbyH

Java 16

Java 16 398 by JCWasmx86 | 296 comments on Hacker News.

Mimecast Finds SolarWinds Hackers Stole Some of Its Source Code

Image
Email security firm Mimecast on Tuesday revealed that the state-sponsored SolarWinds hackers who broke into its internal network also downloaded source code out of a limited number of repositories. "The threat actor did access a subset of email addresses and other contact information and hashed and salted credentials," the company said in a write-up detailing its investigation, adding the from The Hacker News https://ift.tt/2OYXXiU via IFTTT

[Webinar] Oy Vey, We Hired a Large, Hairy Hacker…

Image
It's not every day that one of the best-known independent cybersecurity individuals joins a cybersecurity company. The two are generally on opposite sides of the coin, with little crossover. After all, they're usually concerned with different parts of the cybersecurity puzzle – one providing platforms and tools to defend organizations, the other keeping them accountable and looking for blind from The Hacker News https://ift.tt/3loTXEs via IFTTT

GitHub, f ck your name change

GitHub, f ck your name change 626 by leontrolski | 347 comments on Hacker News.

18-Year-Old Hacker Gets 3 Years in Prison for Massive Twitter 'Bitcoin Scam' Hack

Image
A Florida teen accused of masterminding the hacks of several high-profile Twitter accounts last summer as part of a widespread cryptocurrency scam pled guilty to fraud charges in exchange for a three-year prison sentence. Graham Ivan Clark, 18, will also serve an additional three years on probation. The development comes after the U.S. Department of Justice (DoJ) charged Mason Sheppard (aka from The Hacker News https://ift.tt/38OCtwk via IFTTT

Apple May Start Delivering Security Patches Separately From Other OS Updates

Image
Apple may be changing the way it delivers security patches to its devices running iOS and iPadOS mobile operating systems. According to code spotted in iOS 14.5, the iPhone maker is reportedly working on a method for delivering security fixes independently of other OS updates. The changes were first reported by the 9to5Mac website. <!--adsense--> While Google's Android has had monthly security from The Hacker News https://ift.tt/3eSaIXp via IFTTT

Pangolin – Mobile AMD laptop with Ryzen CPU and Radeon graphics

Pangolin – Mobile AMD laptop with Ryzen CPU and Radeon graphics 432 by bananicorn | 398 comments on Hacker News.

We Don’t Use Docker

We Don’t Use Docker 488 by mundanerality | 489 comments on Hacker News.

HN was down

HN was down 461 by jontro | 242 comments on Hacker News.

Performance comparison: counting words in Python, Go, C++, C, Awk, Forth, Rust

Performance comparison: counting words in Python, Go, C++, C, Awk, Forth, Rust 423 by benhoyt | 292 comments on Hacker News.

The FBI Should Stop Attacking Encryption

The FBI Should Stop Attacking Encryption 429 by KubikPixel | 123 comments on Hacker News.

A hacker got all my texts for $16

A hacker got all my texts for $16 499 by pje | 233 comments on Hacker News.

New Mirai Variant and ZHtrap Botnet Malware Emerge in the Wild

Image
Cybersecurity researchers on Monday disclosed a new wave of ongoing attacks exploiting multiple vulnerabilities to deploy Mirai variants on compromised systems. "Upon successful exploitation, the attackers try to download a malicious shell script, which contains further infection behaviors such as downloading and executing Mirai variants and brute-forcers," Palo Alto Networks' Unit 42 Threat from The Hacker News https://ift.tt/3vsZMW4 via IFTTT

Use This One-Click Mitigation Tool from Microsoft to Prevent Exchange Attacks

Image
Microsoft on Monday released a one-click mitigation software that applies all the necessary countermeasures to secure vulnerable environments against the ongoing widespread ProxyLogon Exchange Server cyberattacks. Called Exchange On-premises Mitigation Tool (EOMT), the PowerShell-based script serves to mitigate against current known attacks using CVE-2021-26855, scan the Exchange Server using from The Hacker News https://ift.tt/3tpd2Jz via IFTTT

Rockstar thanks GTA Online player who fixed load times, official update coming

Rockstar thanks GTA Online player who fixed load times, official update coming 538 by mmhsieh | 146 comments on Hacker News.

Why are tar.xz files 15x smaller when using Python's tar compared to macOS tar?

Why are tar.xz files 15x smaller when using Python's tar compared to macOS tar? 485 by personjerry | 145 comments on Hacker News.

Tweeting “Memphis” autolocks your Twitter account

Tweeting “Memphis” autolocks your Twitter account 523 by hirsin | 329 comments on Hacker News.

Satellite imagery shows Northern California kelp forests have collapsed

Satellite imagery shows Northern California kelp forests have collapsed 546 by PretzelFisch | 346 comments on Hacker News.

Rising Demand for DDoS Protection Software Market By 2020-2028

Image
Distributed Denial of Service (DDoS) attack is a malicious form of attack that disrupts the regular network traffic by overwhelming the website with more traffic than the server can handle. The main aim of this kind of cyberattack is to render the website inoperable. Over recent years, these kinds of attacks are increasing, fueling the demand for the best DDoS protection software solutions. Many from The Hacker News https://ift.tt/3lhEQfX via IFTTT

CEO of Encrypted Chat Platform Indicted for Aiding Organised Criminals

Image
The U.S. Department of Justice (DoJ) on Friday announced an indictment against Jean-Francois Eap, the CEO of encrypted messaging company Sky Global, and an associate for wilfully participating in a criminal enterprise to help international drug traffickers avoid law enforcement. Eap (also known as "888888") and Thomas Herdman, a former high-level distributor of Sky Global devices, have been from The Hacker News https://ift.tt/3cp7QOM via IFTTT

Security.txt

Security.txt 506 by tosh | 110 comments on Hacker News.

Reprojecting the Perseverance landing footage onto satellite imagery

Reprojecting the Perseverance landing footage onto satellite imagery 481 by bmease | 28 comments on Hacker News.

Baserow.io – Self-hosted Airtable alternative

Baserow.io – Self-hosted Airtable alternative 468 by punnerud | 158 comments on Hacker News.

Dhcpcd Will Need a New Maintainer

Dhcpcd Will Need a New Maintainer 558 by elvis70 | 89 comments on Hacker News.

Vitalik escalates ETH 2.0 merge as miners plan a 51% attack

Vitalik escalates ETH 2.0 merge as miners plan a 51% attack 447 by michaelsbradley | 443 comments on Hacker News.

Speed of Rust vs. C

Speed of Rust vs. C 558 by sivizius | 377 comments on Hacker News.

What's New in SQLite 3.35

What's New in SQLite 3.35 473 by nalgeon | 159 comments on Hacker News.

The internet didn’t kill counterculture – you just won’t find it on Instagram

The internet didn’t kill counterculture – you just won’t find it on Instagram 497 by isanengineer | 404 comments on Hacker News.

Two UK Broadband ISPs Trial New Internet Snooping System

Two UK Broadband ISPs Trial New Internet Snooping System 447 by offby37years | 218 comments on Hacker News.

My bank sent me 64 copies of the same debit card

My bank sent me 64 copies of the same debit card 451 by elliekelly | 355 comments on Hacker News.

Write Simply

Write Simply 464 by razin | 325 comments on Hacker News.

CompTIA Security Certification Prep — Lifetime Access for just $30

Image
At long last, top companies are starting to take cybersecurity seriously. As a consequence, technical recruiters are looking for people with hacking skills and certifications to prove it. CompTIA is seen as the gold standard when it comes to cybersecurity exams, with several certifications to choose from. If you would like to scoop them all, The CompTIA Security Infrastructure Expert Bundle is from The Hacker News https://ift.tt/3tgsJ5C via IFTTT

Another Google Chrome 0-Day Bug Found Actively Exploited In-the-Wild

Image
Google has addressed yet another actively exploited zero-day in Chrome browser, marking the second such fix released by the company within a month. The browser maker on Friday shipped 89.0.4389.90 for Windows, Mac, and Linux, which is expected to be rolling out over the coming days/weeks to all users. While the update contains a total of five security fixes, the most important flaw rectified by from The Hacker News https://ift.tt/3cmV17M via IFTTT

Bitwarden Send - A trusted way to securely share information with anyone

Bitwarden Send - A trusted way to securely share information with anyone 519 by 0x54MUR41 | 238 comments on Hacker News.

Researchers Spotted Malware Written in Nim Programming Language

Image
Cybersecurity researchers have unwrapped an "interesting email campaign" undertaken by a threat actor that has taken to distributing a new malware written in Nim programming language. Dubbed "NimzaLoader" by Proofpoint researchers, the development marks one of the rare instances of Nim malware discovered in the threat landscape. "Malware developers may choose to use a rare programming language from The Hacker News https://ift.tt/3eJIiz1 via IFTTT

Hackers Are Targeting Microsoft Exchange Servers With Ransomware

Image
It didn't take long. Intelligence agencies and cybersecurity researchers had been warning that unpatched Exchange Servers could open the pathway for ransomware infections in the wake of swift escalation of the attacks since last week. Now it appears that threat actors have caught up.  According to the latest reports, cybercriminals are leveraging the heavily exploited ProxyLogon Exchange Server from The Hacker News https://ift.tt/3qHEX5H via IFTTT

New Browser Attack Allows Tracking Users Online With JavaScript Disabled

Image
Researchers have discovered a new side-channel that they say can be reliably exploited to leak information from web browsers that could then be leveraged to track users even when JavaScript is completely disabled. "This is a side-channel attack which doesn't require any JavaScript to run," the researchers said. "This means script blockers cannot stop it. The attacks work even if you strip out from The Hacker News https://ift.tt/3qERMxM via IFTTT

Julia receives DARPA award to accelerate electronics simulation

Julia receives DARPA award to accelerate electronics simulation 440 by jonbaer | 134 comments on Hacker News.

How I earn a living selling my open-source web-based invoicing application

How I earn a living selling my open-source web-based invoicing application 519 by nephics | 152 comments on Hacker News.

U.S. senators reintroduce bill to make daylight saving time permanent

U.S. senators reintroduce bill to make daylight saving time permanent 483 by prostoalex | 388 comments on Hacker News.

I bought 300 emoji domain names from Kazakhstan and built an email service

I bought 300 emoji domain names from Kazakhstan and built an email service 580 by tinyprojects | 260 comments on Hacker News.

ProxyLogon PoC Exploit Released; Likely to Fuel More Disruptive Cyber Attacks

Image
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) on Wednesday issued a joint advisory warning of active exploitation of vulnerabilities in Microsoft Exchange on-premises products by nation-state actors and cybercriminals. "CISA and FBI assess that adversaries could exploit these vulnerabilities to compromise networks, steal from The Hacker News https://ift.tt/3vpGMIa via IFTTT

Fixing the Weakest Link — The Passwords — in Cybersecurity Today

Image
Password security has long been an issue for businesses and their cybersecurity standards. Account passwords are often the weakest link in the overall security posture for many organizations. Many companies have used Microsoft's default password policies for decades. While these can be customized, businesses often accept the default values for their organization. The Windows default password from The Hacker News https://ift.tt/3bCpcbP via IFTTT

Critical Pre-Auth RCE Flaw Found in F5 Big-IP Platform — Patch ASAP!

Image
Application security company F5 Networks on Wednesday published an advisory warning of four critical vulnerabilities impacting multiple products that could result in a denial of service (DoS) attack and even unauthenticated remote code execution on target networks. The patches concern a total of seven related flaws (from CVE-2021-22986 through CVE-2021-22992), two of which were discovered and from The Hacker News https://ift.tt/2NaO1lY via IFTTT

Apple has gone to extraordinary lengths to make scroll bars invisible

Apple has gone to extraordinary lengths to make scroll bars invisible 520 by edward | 366 comments on Hacker News.

We created a fake language to root out resume liars

We created a fake language to root out resume liars 511 by rmason | 679 comments on Hacker News.

Why asynchronous Rust doesn't work

Why asynchronous Rust doesn't work 566 by tazjin | 425 comments on Hacker News.

Hackers break into thousands of security cameras, exposing Tesla, jail, hospital

Hackers break into thousands of security cameras, exposing Tesla, jail, hospital 646 by f430 | 264 comments on Hacker News.

Git: Malicious repositories can execute remote code while cloning

Git: Malicious repositories can execute remote code while cloning 599 by todsacerdoti | 199 comments on Hacker News.

Write libraries instead of services, where possible

Write libraries instead of services, where possible 618 by catern | 318 comments on Hacker News.

New algorithm breaks speed limit for solving linear equations

New algorithm breaks speed limit for solving linear equations 546 by ot | 112 comments on Hacker News.

Researchers Unveil New Linux Malware Linked to Chinese Hackers

Image
Cybersecurity researchers on Wednesday shed light on a new sophisticated backdoor targeting Linux endpoints and servers that's believed to be the work of Chinese nation-state actors. Dubbed "RedXOR" by Intezer, the backdoor masquerades as a polkit daemon, with similarities found between the malware and those previously associated with the Winnti Umbrella (or Axiom) threat group such as ​PWNLNX, from The Hacker News https://ift.tt/3qxR2u7 via IFTTT

Fire declared in OVH SBG2 datacentre building

Fire declared in OVH SBG2 datacentre building 656 by finniananderson | 301 comments on Hacker News.

FIN8 Hackers Return With More Powerful Version of BADHATCH PoS Malware

Image
Threat actors known for keeping a low profile do so by ceasing operations for prolonged periods in between to evade attracting any attention as well as constantly refining their toolsets to fly below the radar of many detection technologies. One such group is FIN8, a financially motivated threat actor that's back in action after a year-and-a-half hiatus with a powerful version of a backdoor with from The Hacker News https://ift.tt/3qxJGqG via IFTTT

Microsoft Issues Security Patches for 82 Flaws — IE 0-Day Under Active Attacks

Image
Microsoft plugged as many as 89 security flaws as part of its monthly Patch Tuesday updates released today, including fixes for an actively exploited zero-day in Internet Explorer that could permit an attacker to run arbitrary code on target machines. Of these flaws, 14 are listed as Critical, and 75 are listed as Important in severity, out of which two of the bugs are described as publicly from The Hacker News https://ift.tt/2OBROsL via IFTTT

Fuckin' user interface design, I swear

Fuckin' user interface design, I swear 654 by luu | 382 comments on Hacker News.

9 Android Apps On Google Play Caught Distributing AlienBot Banker and MRAT Malware

Image
Cybersecurity researchers have discovered a new malware dropper contained in as many as 9 Android apps distributed via Google Play Store that deploys a second stage malware capable of gaining intrusive access to the financial accounts of victims as well as full control of their devices. "This dropper, dubbed Clast82, utilizes a series of techniques to avoid detection by Google Play Protect from The Hacker News https://ift.tt/3v5uMeB via IFTTT