Posts

Showing posts from September, 2021

Update Google Chrome ASAP to Patch 2 New Actively Exploited Zero-Day Flaws

Image
Google on Thursday pushed urgent security fixes for its Chrome browser, including a pair of new security weaknesses that the company said are being exploited in the wild, making them the fourth and fifth actively zero-days plugged this month alone. The issues, designated as CVE-2021-37975 and CVE-2021-37976, are part of a total of four patches, and concern a use-after-free flaw in V8 JavaScript from The Hacker News https://ift.tt/3uqNRIe via IFTTT

PostgreSQL 14

PostgreSQL 14 574 by jkatz05 | 137 comments on Hacker News.

New Azure AD Bug Lets Hackers Brute-Force Passwords Without Getting Caught

Image
Cybersecurity researchers have disclosed an unpatched security vulnerability in the protocol used by Microsoft Azure Active Directory that potential adversaries could abuse to stage undetected brute-force attacks. "This flaw allows threat actors to perform single-factor brute-force attacks against Azure Active Directory (Azure AD) without generating sign-in events in the targeted organization's from The Hacker News https://ift.tt/3omH4OY via IFTTT

Incentivizing Developers is the Key to Better Security Practices

Image
Professional developers want to embrace DevSecOps and write secure code, but their organizations need to support this seachange if they want that effort to grow. The cyber threat landscape is becoming more complex by the day. Attackers are constantly scanning networks for vulnerable applications, programs, cloud instances, and the latest flavor of the month is APIs, widely considered an easy win from The Hacker News https://ift.tt/2Wu96fO via IFTTT

ImmuniWeb Launches Free Cloud Security Test to Detect Unprotected Storage

Image
The IDC cloud security survey 2021 states that as many as 98% of companies were victims of a cloud data breach within the past 18 months. Fostered by the pandemic, small and large organizations from all over the world are migrating their data and infrastructure into a public cloud, while often underestimating novel and cloud-specific security or privacy issues.  Nearly every morning, the from The Hacker News https://ift.tt/3zUWPys via IFTTT

New Tomiris Backdoor Found Linked to Hackers Behind SolarWinds Cyberattack

Image
Cybersecurity researchers on Wednesday disclosed a previously undocumented backdoor likely designed and developed by the Nobelium advanced persistent threat (APT) behind last year's SolarWinds supply chain attack, joining the threat actor's ever-expanding arsenal of hacking tools. Moscow-headquartered firm Kaspersky codenamed the malware "Tomiris," calling out its similarities to another from The Hacker News https://ift.tt/39NwurC via IFTTT

Cybersecurity Firm Group-IB's CEO Arrested Over Treason Charges in Russia

Image
Russian authorities on Wednesday arrested and detained Ilya Sachkov, the founder of cybersecurity firm Group-IB, for two months in Moscow on charges of state treason following a search of its office on September 28. The Russian company, which is headquartered in Singapore, confirmed the development but noted the "reason for the search was not yet clear," adding "The decentralized infrastructure from The Hacker News https://ift.tt/3uqmRIW via IFTTT

Simula One: an office-focused, standalone VR headset built on top of Linux

Simula One: an office-focused, standalone VR headset built on top of Linux 513 by sandebert | 201 comments on Hacker News.

Making Bracket Pair Colorization Faster

Making Bracket Pair Colorization Faster 487 by feross | 139 comments on Hacker News.

Almost All of Facebook’s Top Christian Pages in 2019 Run by Foreign Troll Farms

Almost All of Facebook’s Top Christian Pages in 2019 Run by Foreign Troll Farms 524 by mhoad | 268 comments on Hacker News.

My Wife Was Dying of Brain Cancer. My Boss at Amazon Told Me to Perform or Quit

My Wife Was Dying of Brain Cancer. My Boss at Amazon Told Me to Perform or Quit 510 by posharma | 311 comments on Hacker News.

Facebook Releases New Tool That Finds Security and Privacy Bugs in Android Apps

Image
Facebook on Wednesday announced it's open-sourcing Mariana Trench, an Android-focused static analysis platform the company uses to detect and prevent security and privacy bugs in applications created for the mobile operating system at scale. "[Mariana Trench] is designed to be able to scan large mobile codebases and flag potential issues on pull requests before they make it into production," the from The Hacker News https://ift.tt/3il5kwO via IFTTT

YouTube is banning anti-vaccine activists and blocking all anti-vaccine content

YouTube is banning anti-vaccine activists and blocking all anti-vaccine content 589 by danso | 932 comments on Hacker News.

Beware! This Android Trojan Stole Millions of Dollars from Over 10 Million Users

Image
A newly discovered "aggressive" mobile campaign has infected north of 10 million users from over 70 countries via seemingly innocuous Android apps that subscribe the individuals to premium services costing €36 (~$42) per month without their knowledge. Zimperium zLabs dubbed the malicious trojan "GriftHorse." The money-making scheme is believed to have been under active development starting from from The Hacker News https://ift.tt/3kSQ8Ji via IFTTT

[eBook] Your First 90 Days as CISO — 9 Steps to Success

Image
Chief Information Security Officers (CISOs) are an essential pillar of an organization’s defense, and they must account for a lot. Especially for new CISOs, this can be a daunting task. The first 90 days for a new CISO are crucial in setting up their security team, so there is little time to waste, and much to accomplish.  Fortunately. A new guide by XDR provider Cynet (download here) looks to from The Hacker News https://ift.tt/3opL4Om via IFTTT

Hackers Targeting Brazil's PIX Payment System to Drain Users' Bank Accounts

Image
Two newly discovered malicious Android applications on Google Play Store have been used to target users of Brazil's instant payment ecosystem in a likely attempt to lure victims into fraudulently transferring their entire account balances into another bank account under cybercriminals' control. "The attackers distributed two different variants of banking malware, named PixStealer and MalRhino, from The Hacker News https://ift.tt/3DaQpO3 via IFTTT

New FinSpy Malware Variant Infects Windows Systems With UEFI Bootkit

Image
Commercially developed FinFisher surveillanceware has been upgraded to infect Windows devices using a UEFI (Unified Extensible Firmware Interface) bootkit using a trojanized Windows Boot Manager, marking a shift in infection vectors that allow it to elude discovery and analysis. Detected in the wild since 2011, FinFisher (aka FinSpy or Wingbird) is a spyware toolset for Windows, macOS, and Linux from The Hacker News https://ift.tt/3unNaQ7 via IFTTT

Cloudflare R2 storage: Rapid and reliable object storage, minus the egress fees

Cloudflare R2 storage: Rapid and reliable object storage, minus the egress fees 475 by geostyx | 163 comments on Hacker News.

You either die an MVP or live long enough to build content moderation

You either die an MVP or live long enough to build content moderation 495 by mmcclure | 225 comments on Hacker News.

Atlassian Confluence RCE Flaw Abused in Multiple Cyberattack Campaigns

Image
Opportunistic threat actors have been found actively exploiting a recently disclosed critical security flaw in Atlassian Confluence deployments across Windows and Linux to deploy web shells that result in the execution of crypto miners on compromised systems. Tracked as CVE-2021-26084 (CVSS score: 9.8), the vulnerability concerns an OGNL (Object-Graph Navigation Language) injection flaw that from The Hacker News https://ift.tt/39IlfRl via IFTTT

Imgur Acquired by Medialab

Imgur Acquired by Medialab 443 by mburst | 250 comments on Hacker News.

New BloodyStealer Trojan Steals Gamers' Epic Games and Steam Accounts

Image
A new advanced trojan sold on Russian-speaking underground forums comes with capabilities to steal users' accounts on popular online video game distribution services, including Steam, Epic Games Store, and EA Origin, underscoring a growing threat to the lucrative gaming market. Cybersecurity firm Kaspersky, which coined the malware "BloodyStealer," said it first detected the malicious tool in from The Hacker News https://ift.tt/3ui0TaY via IFTTT

What it's like to spend 40-50 hours in VR every week

What it's like to spend 40-50 hours in VR every week 508 by eflowers | 214 comments on Hacker News.

The Mom Test – How to talk to customers

The Mom Test – How to talk to customers 441 by jack335 | 126 comments on Hacker News.

Microsoft Warns of FoggyWeb Malware Targeting Active Directory FS Servers

Image
Microsoft on Monday revealed new malware deployed by the hacking group behind the SolarWinds supply chain attack last December to deliver additional payloads and steal sensitive information from Active Directory Federation Services (AD FS) servers. The tech giant's Threat Intelligence Center (MSTIC) codenamed the "passive and highly targeted backdoor" FoggyWeb, making it the threat actor tracked from The Hacker News https://ift.tt/3CRWvme via IFTTT

Something weird is happening on Facebook

Something weird is happening on Facebook 574 by incomplete | 208 comments on Hacker News.

Prevent Google from mangling search result links when click/copying on Firefox

Prevent Google from mangling search result links when click/copying on Firefox 451 by calmingsolitude | 162 comments on Hacker News.

How big tech runs tech projects and the curious absence of Scrum

How big tech runs tech projects and the curious absence of Scrum 528 by PretzelFisch | 389 comments on Hacker News.

A single person answered 76k questions about SQL on StackOverflow

A single person answered 76k questions about SQL on StackOverflow 486 by w-m | 175 comments on Hacker News.

Russian Turla APT Group Deploying New Backdoor on Targeted Systems

Image
State-sponsored hackers affiliated with Russia are behind a new series of intrusions using a previously undocumented implant to compromise systems in the U.S., Germany, and Afghanistan. Cisco Talos attributed the attacks to the Turla advanced persistent threat (APT) group, coining the malware "TinyTurla" for its limited functionality and efficient coding style that allows it to go undetected. from The Hacker News https://ift.tt/3EVzWio via IFTTT

I just don’t want to be busy anymore

I just don’t want to be busy anymore 608 by PretzelFisch | 350 comments on Hacker News.

New Android Malware Steals Financial Data from 378 Banking and Wallet Apps

Image
The operators behind the BlackRock mobile malware have surfaced back with a new Android banking trojan called ERMAC that targets Poland and has its roots in the infamous Cerberus malware, according to the latest research. "The new trojan already has active distribution campaigns and is targeting 378 banking and wallet apps with overlays," ThreatFabric's CEO Cengiz Han Sahin said in an emailed from The Hacker News https://ift.tt/3ueaAr1 via IFTTT

How Does DMARC Prevent Phishing?

Image
DMARC is a global standard for email authentication. It allows senders to verify that the email really comes from whom it claims to come from. This helps curb spam and phishing attacks, which are among the most prevalent cybercrimes of today. Gmail, Yahoo, and many other large email providers have implemented DMARC and praised its benefits in recent years. If your company's domain name is from The Hacker News https://ift.tt/3i7WHpy via IFTTT

Apple’s app review prevents developer from submitting fix to game for the blind

Apple’s app review prevents developer from submitting fix to game for the blind 561 by latexr | 152 comments on Hacker News.

A New Jupyter Malware Version is Being Distributed via MSI Installers

Image
Cybersecurity researchers have charted the evolution of Jupyter, a .NET infostealer known for singling out healthcare and education sectors, which make it exceptional at defeating most endpoint security scanning solutions. The new delivery chain, spotted by Morphisec on September 8, underscores that the malware has not just continued to remain active but also showcases "how threat actors from The Hacker News https://ift.tt/2Y07lri via IFTTT

Moiré No More

Moiré No More 574 by stock_toaster | 76 comments on Hacker News.

Congratulations, Mini, you made the stupidest turn signals ever

Congratulations, Mini, you made the stupidest turn signals ever 614 by colinprince | 305 comments on Hacker News.

Many believe it's time to do away with lawmakers making stock trades

Many believe it's time to do away with lawmakers making stock trades 547 by DocFeind | 221 comments on Hacker News.

Apple's Power Move to Kneecap Facebook Advertising Is Working

Apple's Power Move to Kneecap Facebook Advertising Is Working 539 by exolymph | 390 comments on Hacker News.

Nginx Playground

Nginx Playground 540 by pradeepchhetri | 34 comments on Hacker News.

Leaked grant proposal details high-risk coronavirus research

Leaked grant proposal details high-risk coronavirus research 641 by BellLabradors | 401 comments on Hacker News.

Ask HN: Are you also getting extremely obvious spam bypassing Gmail's filters?

The NSA and CIA use ad blockers

The NSA and CIA use ad blockers 552 by infodocket | 321 comments on Hacker News.

Urgent Chrome Update Released to Patch Actively Exploited Zero-Day Vulnerability

Image
Google on Friday rolled out an emergency security patch to its Chrome web browser to address a security flaw that's known to have an exploit in the wild. Tracked as CVE-2021-37973, the vulnerability has been described as use after free in Portals API, a web page navigation system that enables a page to show another page as an inset and "perform a seamless transition to a new state, where the from The Hacker News https://ift.tt/3zFvTmn via IFTTT

SonicWall Issues Patches for a New Critical Flaw in SMA 100 Series Devices

Image
Network security company SonicWall has addressed a critical security vulnerability affecting its Secure Mobile Access (SMA) 100 series appliances that can permit remote, unauthenticated attackers to gain administrator access on targeted devices remotely. Tracked as CVE-2021-20034, the arbitrary file deletion flaw is rated 9.1 out of a maximum of 10 on the CVSS scoring system, and could allow an from The Hacker News https://ift.tt/3CIHsuW via IFTTT

A New APT Hacker Group Spying On Hotels and Governments Worldwide

Image
A new advanced persistent threat (APT) has been behind a string of attacks against hotels across the world, along with governments, international organizations, engineering companies, and law firms. Slovak cybersecurity firm ESET codenamed the cyber espionage group FamousSparrow, which it said has been active since at least August 2019, with victims located across Africa, Asia, Europe, the from The Hacker News https://ift.tt/3CPtdEN via IFTTT

Submarine cable map rendered onto a globe

Submarine cable map rendered onto a globe 596 by Daviey | 151 comments on Hacker News.

Do not leave XPS laptop in any sleep/hibernate/standby mode when placed in a bag

Do not leave XPS laptop in any sleep/hibernate/standby mode when placed in a bag 586 by bestouff | 515 comments on Hacker News.

Apple's New iCloud Private Relay Service Leaks Users' Real IP Addresses

Image
A new as-yet unpatched weakness in Apple's iCloud Private Relay feature could be circumvented to leak users' true IP addresses from iOS devices running the latest version of the operating system. Introduced with iOS 15, which was officially released this week, iCloud Private Relay aims to improve anonymity on the web by employing a dual-hop architecture that effectively shields users' IP address from The Hacker News https://ift.tt/39BQ8Xn via IFTTT

Google Warns of a New Way Hackers Can Make Malware Undetectable on Windows

Image
Cybersecurity researchers have disclosed a novel technique adopted by threat actors to deliberately evade detection with the help of malformed digital signatures of its malware payloads. "Attackers created malformed code signatures that are treated as valid by Windows but are not able to be decoded or checked by OpenSSL code — which is used in a number of security scanning products," Google from The Hacker News https://ift.tt/2XJhSa7 via IFTTT

Cisco Releases Patches 3 New Critical Flaws Affecting IOS XE Software

Image
Networking equipment maker Cisco Systems has rolled out patches to address three critical security vulnerabilities in its IOS XE network operating system that remote attackers could potentially abuse to execute arbitrary code with administrative privileges and trigger a denial-of-service (DoS) condition on vulnerable devices. The list of three flaws is as follows - CVE-2021-34770 (CVSS score: from The Hacker News https://ift.tt/3u4FyBO via IFTTT

Disclosure of three 0-day iOS vulnerabilities

Disclosure of three 0-day iOS vulnerabilities 543 by jayhoon | 115 comments on Hacker News.

Facebook paid billions to spare Zuckerberg in data suit, shareholders allege

Facebook paid billions to spare Zuckerberg in data suit, shareholders allege 500 by croes | 289 comments on Hacker News.

Urgent Apple iOS and macOS Updates Released to Fix Actively Exploited Zero-Days

Image
Apple on Thursday released security updates to fix multiple security vulnerabilities in older versions of iOS and macOS that it says have been detected in exploits in the wild, in addition to expanding patches for a previously plugged security weakness abused by NSO Group's Pegasus surveillance tool to target iPhone users. <!--adsense--> Chief among them is CVE-2021-30869, a type confusion flaw from The Hacker News https://ift.tt/2XUjP3Q via IFTTT

Google keeps records of everything you buy, even if you delete the email receipt

Google keeps records of everything you buy, even if you delete the email receipt 501 by decrypt | 254 comments on Hacker News.

Lab-grown meat may never be cost-competitive enough to displace traditional meat

Lab-grown meat may never be cost-competitive enough to displace traditional meat 495 by coldturkey | 917 comments on Hacker News.

Leaving the Apple ecosystem behind

Leaving the Apple ecosystem behind 481 by recvonline | 465 comments on Hacker News.

Microsoft Exchange Bug Exposes ~100,000 Windows Domain Credentials

Image
An unpatched design flaw in the implementation of Microsoft Exchange's Autodiscover protocol has resulted in the leak of approximately 100,000 login names and passwords for Windows domains worldwide. "This is a severe security issue, since if an attacker can control such domains or has the ability to 'sniff' traffic in the same network, they can capture domain credentials in plain text (HTTP from The Hacker News https://ift.tt/3EJAQhD via IFTTT

A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit

Image
Security researchers have disclosed an unpatched weakness in Microsoft Windows Platform Binary Table (WPBT) affecting all Windows-based devices since Windows 8 that could be potentially exploited to install a rootkit and compromise the integrity of devices. "These flaws make every Windows system vulnerable to easily-crafted attacks that install fraudulent vendor-specific tables," researchers from The Hacker News https://ift.tt/3nXHE5h via IFTTT

Why You Should Consider QEMU Live Patching

Image
Sysadmins know what the risks are of running unpatched services. Given the choice, and unlimited resources, most hardworking administrators will ensure that all systems and services are patched consistently. But things are rarely that simple. Technical resources are limited, and patching can often be more complicated than it appears at first glance. Worse, some services are so hidden in the from The Hacker News https://ift.tt/3lQ92j8 via IFTTT

New Android Malware Targeting US, Canadian Users with COVID-19 Lures

Image
An "insidious" new SMS smishing malware has been found targeting Android mobile users in the U.S. and Canada as part of a new campaign that uses SMS text message lures related to COVID-19 regulations and vaccine information in an attempt to steal personal and financial data. Proofpoint's messaging security subsidiary Cloudmark coined the emerging malware "TangleBot." <!--adsense--> "The malware from The Hacker News https://ift.tt/39sbEOq via IFTTT

Colombian Real Estate Agency Leak Exposes Records of Over 100,000 Buyers

Image
More than one terabyte of data containing 5.5 million files has been left exposed, leaking personal information of over 100,000 customers of a Colombian real estate firm, according to cybersecurity company WizCase. The breach was discovered by Ata Hakçıl and his team in a database owned by Coninsa Ramon H, a company that specializes in architecture, engineering, construction, and real estate from The Hacker News https://ift.tt/3o10GIg via IFTTT

How we got to LiveView

How we got to LiveView 547 by klohto | 177 comments on Hacker News.

Waydroid – Run Android containers on Ubuntu

Waydroid – Run Android containers on Ubuntu 532 by pabs3 | 175 comments on Hacker News.

Lithuania says throw away Chinese phones due to censorship concerns

Lithuania says throw away Chinese phones due to censorship concerns 540 by ChemSpider | 299 comments on Hacker News.

Google Drive of Historical Footage Locked and Flagged as Terrorist Activity

Google Drive of Historical Footage Locked and Flagged as Terrorist Activity 492 by knaik94 | 105 comments on Hacker News.

DIY RGB Icosahedron

DIY RGB Icosahedron 473 by blutack | 80 comments on Hacker News.

Mister Rogers had a simple set of rules for talking to children (2018)

Mister Rogers had a simple set of rules for talking to children (2018) 508 by Tomte | 149 comments on Hacker News.

The First Rule of Machine Learning: Start Without Machine Learning

The First Rule of Machine Learning: Start Without Machine Learning 538 by 7d7n | 131 comments on Hacker News.

Microsoft Warns of a Wide-Scale Phishing-as-a-Service Operation

Image
Microsoft has opened the lid on a large-scale phishing-as-a-service (PHaaS) operation that's involved in selling phishing kits and email templates as well as providing hosting and automated services at a low cost, thus enabling cyber actors to purchase phishing campaigns and deploy them with minimal efforts. "With over 100 available phishing templates that mimic known brands and services, the from The Hacker News https://ift.tt/3nTxyTb via IFTTT

New Nagios Software Bugs Could Let Hackers Take Over IT Infrastructures

Image
As many as 11 security vulnerabilities have been disclosed in Nagios network management systems, some of which could be chained to achieve pre-authenticated remote code execution with the highest privileges, as well as lead to credential theft and phishing attacks.  Industrial cybersecurity firm Claroty, which discovered the flaws, said flaws in tools such as Nagios make them an attractive from The Hacker News https://ift.tt/39oTOvL via IFTTT

How Cynet's Response Automation Helps Organizations Mitigate Cyber Threats

Image
One of the determining factors of how much damage a cyber-attack cause is how fast organizations can respond to it. Time to response is critical for security teams, and it is a major hurdle for leaner teams. To help improve this metric and enhance organizations’ ability to respond to attacks quickly, many endpoint detection and response (EDR) and extended detection and response (XDR) vendors from The Hacker News https://ift.tt/3CydJos via IFTTT

US Sanctions Cryptocurrency Exchange SUEX for Aiding Ransomware Gangs

Image
The U.S. Treasury Department on Tuesday imposed sanctions on Russian cryptocurrency exchange Suex for helping facilitate and launder transactions from at least eight ransomware variants as part of the government's efforts to crack down on a surge in ransomware incidents and make it difficult for bad actors to profit from such attacks using digital currencies. "Virtual currency exchanges such as from The Hacker News https://ift.tt/3tYsnlU via IFTTT

The Gap in Your Zero Trust Implementation

Image
Over the last several years, there have been numerous high-profile security breaches. These breaches have underscored the fact that traditional cyber defenses have become woefully inadequate and that stronger defenses are needed. As such, many organizations have transitioned toward a zero trust security model. A zero trust security model is based on the idea that no IT resource should be trusted from The Hacker News https://ift.tt/2Zba15G via IFTTT

High-Severity RCE Flaw Disclosed in Several Netgear Router Models

Image
Networking equipment company Netgear has released patches to remediate a high-severity remote code execution vulnerability affecting multiple routers that could be exploited by remote attackers to take control of an affected system. <!--adsense--> Traced as CVE-2021-40847 (CVSS score: 8.1), the security weakness impacts the following models - R6400v2 (fixed in firmware version 1.0.4.120) R6700 from The Hacker News https://ift.tt/3lK15Ml via IFTTT

VMware Warns of Critical File Upload Vulnerability Affecting vCenter Server

Image
VMware on Tuesday published a new bulletin warning of as many as 19 vulnerabilities in vCenter Server and Cloud Foundation appliances that a remote attacker could exploit to take control of an affected system. The most urgent among them is an arbitrary file upload vulnerability in the Analytics service (CVE-2021-22005) that impacts vCenter Server 6.7 and 7.0 deployments. "A malicious actor with from The Hacker News https://ift.tt/3hXfu6R via IFTTT

The Framework is the most exciting laptop I've used

The Framework is the most exciting laptop I've used 742 by samizdis | 448 comments on Hacker News.

A Tunguska size burst destroyed Tall el-Hammam, Bronze Age city in Jordan Valley

A Tunguska size burst destroyed Tall el-Hammam, Bronze Age city in Jordan Valley 471 by olvy0 | 227 comments on Hacker News.

Unpatched High-Severity Vulnerability Affects Apple macOS Computers

Image
Cybersecurity researchers on Tuesday disclosed details of an unpatched vulnerability in macOS Finder that could be abused by remote adversaries to trick users into running arbitrary commands on the machines. "A vulnerability in macOS Finder allows files whose extension is inetloc to execute arbitrary commands, these files can be embedded inside emails which if the user clicks on them will from The Hacker News https://ift.tt/3hTjaXa via IFTTT

Cring Ransomware Gang Exploits 11-Year-Old ColdFusion Bug

Image
Unidentified threat actors breached a server running an unpatched, 11-year-old version of Adobe's ColdFusion 9 software in minutes to remotely take over control and deploy file-encrypting Cring ransomware on the target's network 79 hours after the hack. The server, which belonged to an unnamed services company, was used to collect timesheet and accounting data for payroll as well as to host a from The Hacker News https://ift.tt/3hUMQTH via IFTTT

I started SaaS companies in 2013 and 2021 – how things have changed

I started SaaS companies in 2013 and 2021 – how things have changed 437 by zuhayeer | 118 comments on Hacker News.

New Capoae Malware Infiltrates WordPress Sites and Installs Backdoored Plugin

Image
A recently discovered wave of malware attacks has been spotted using a variety of tactics to enslave susceptible machines with easy-to-guess administrative credentials to co-opt them into a network with the goal of illegally mining cryptocurrency. "The malware's primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they've been infected, from The Hacker News https://ift.tt/3EBG0we via IFTTT

Cybersecurity Priorities in 2021: How Can CISOs Re-Analyze and Shift Focus?

Image
2020 was a year of relentless disruptions. The protective layer of secured enterprise networks and controlled IT environments of the physical premises did not exist. Over the past year, CISOs (Chief Information Security Officers) have had to grapple with the challenges of bolstering the security posture, minimizing risks, and ensuring business continuity in the new normal. The rise in volumes from The Hacker News https://ift.tt/39uN1jT via IFTTT

ClickHouse, Inc.

ClickHouse, Inc. 433 by zX41ZdbW | 136 comments on Hacker News.

Home Price to Income Ratio

Home Price to Income Ratio 449 by hncurious | 538 comments on Hacker News.

Bye YouTube, Hello PeerTube [video]

Bye YouTube, Hello PeerTube [video] 430 by x14km2d | 284 comments on Hacker News.

Show HN: Fully-searchable Library Genesis on IPFS

Show HN: Fully-searchable Library Genesis on IPFS 434 by sixtyfourbits | 92 comments on Hacker News.

Show HN: 40k books on HN extracted using deep learning

Show HN: 40k books on HN extracted using deep learning 518 by tracyhenry | 149 comments on Hacker News.

If I could bring one thing back to the internet it would be blogs (2020)

If I could bring one thing back to the internet it would be blogs (2020) 455 by artkulak | 223 comments on Hacker News.

Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters

Image
Law enforcement agencies in Italy and Spain have dismantled an organized crime group linked to the Italian Mafia that was involved in online fraud, money laundering, drug trafficking, and property crime, netting the gang about €10 million ($11.7 million) in illegal proceeds in just a year. "The suspects defrauded hundreds of victims through phishing attacks and other types of online fraud such from The Hacker News https://ift.tt/3zuHQuR via IFTTT

A New Wave of Malware Attack Targeting Organizations in South America

Image
A spam campaign delivering spear-phishing emails aimed at South American organizations has retooled its techniques to include a wide range of commodity remote access trojans (RATs) and geolocation filtering to avoid detection, according to new research. Cybersecurity firm Trend Micro attributed the attacks to an advanced persistent threat (APT) tracked as APT-C-36 (aka Blind Eagle), a suspected from The Hacker News https://ift.tt/3lFSABT via IFTTT

Freenet is a peer-to-peer platform for censorship-resistant communication

Freenet is a peer-to-peer platform for censorship-resistant communication 434 by brian_herman | 270 comments on Hacker News.

Google to Auto-Reset Unused Android App Permissions for Billions of Devices

Image
Google on Friday said it's bringing an Android 11 feature that auto-resets permissions granted to apps that haven't been used in months, to devices running Android versions 6 and above. The expansion is expected to go live later this year in December 2021 and enabled on Android phones with Google Play services running Android 6.0 (API level 23) or higher, which the company said should cover " from The Hacker News https://ift.tt/3kpjwGF via IFTTT

How to rapidly improve at any programming language (2016)

How to rapidly improve at any programming language (2016) 439 by jcubic | 121 comments on Hacker News.

Building apps in minutes, not months

Building apps in minutes, not months 443 by stevekrouse | 275 comments on Hacker News.

Life-size camel sculptures in Saudi Arabia are older than Stonehenge, pyramids

Life-size camel sculptures in Saudi Arabia are older than Stonehenge, pyramids 419 by pseudolus | 126 comments on Hacker News.

Numando: A New Banking Trojan Targeting Latin American Users

Image
A newly spotted banking trojan has been caught leveraging legitimate platforms like YouTube and Pastebin to store its encrypted, remote configuration and commandeer infected Windows systems, making it the latest to join the long list of malware targeting Latin America (LATAM) after Guildma, Javali, Melcoz, Grandoreiro, Mekotio, Casbaneiro, Amavaldo, Vadokrist, and Janeleiro. The threat actor from The Hacker News https://ift.tt/3ExzRRw via IFTTT

Serving Netflix Video at 400Gb/s on FreeBSD [pdf]

Serving Netflix Video at 400Gb/s on FreeBSD [pdf] 477 by drewg123 | 234 comments on Hacker News.

Belgian ISP under 250 Gbps DDoS for days on end

Belgian ISP under 250 Gbps DDoS for days on end 479 by laurensr | 291 comments on Hacker News.

Video of Tesla FSD almost hitting pedestrian receives DMCA takedown

Video of Tesla FSD almost hitting pedestrian receives DMCA takedown 481 by camjohnson26 | 433 comments on Hacker News.

Mailchimp insiders react to employees getting no equity from Intuit sale

Mailchimp insiders react to employees getting no equity from Intuit sale 498 by lemoncucumber | 442 comments on Hacker News.

Windows 11: Just say no

Windows 11: Just say no 467 by CrankyBear | 524 comments on Hacker News.

The Perils of an .xyz Domain

The Perils of an .xyz Domain 486 by ghempton | 269 comments on Hacker News.

Gitlab S-1

Gitlab S-1 605 by laminarflow | 182 comments on Hacker News.

Lumber crash leads to 'blowout' sales as prices crater

Lumber crash leads to 'blowout' sales as prices crater 586 by awnird | 503 comments on Hacker News.

Google, Apple remove Navalny app from stores as Russian elections begin

Google, Apple remove Navalny app from stores as Russian elections begin 667 by exizt88 | 459 comments on Hacker News.

The new warrant: how US police mine Google for your location and search history

The new warrant: how US police mine Google for your location and search history 608 by DamnInteresting | 286 comments on Hacker News.

Prefer the British Style of Quotation Mark Punctuation over the American

Prefer the British Style of Quotation Mark Punctuation over the American 604 by erwald | 380 comments on Hacker News.

New Malware Targets Windows Subsystem for Linux to Evade Detection

Image
A number of malicious samples have been created for the Windows Subsystem for Linux (WSL) with the goal of compromising Windows machines, highlighting a sneaky method that allows the operators to stay under the radar and thwart detection by popular anti-malware engines. The "distinct tradecraft" marks the first instance where a threat actor has been found abusing WSL to install subsequent from The Hacker News https://ift.tt/3hIU6Sx via IFTTT

Malware Attack on Aviation Sector Uncovered After Going Unnoticed for 2 Years

Image
A targeted phishing campaign aimed at the aviation industry for two years may be spearheaded by a threat actor operating out of Nigeria, highlighting how attackers can carry out small-scale cyber offensives for extended periods of time while staying under the radar. Cisco Talos dubbed the malware attacks "Operation Layover," building on previous research from the Microsoft Security Intelligence from The Hacker News https://ift.tt/3kiImYJ via IFTTT

Atlassian fired me while I was taking care of my wife who is fighting cancer

Atlassian fired me while I was taking care of my wife who is fighting cancer 745 by mparnisari | 421 comments on Hacker News.

Sir Clive Sinclair has died

Sir Clive Sinclair has died 802 by haasted | 207 comments on Hacker News.

Show HN: Time travel debugger for web development

Show HN: Time travel debugger for web development 641 by jasonlaster11 | 204 comments on Hacker News.

How percentile approximation works and why it's more useful than averages

How percentile approximation works and why it's more useful than averages 673 by od0 | 162 comments on Hacker News.

Please stop closing forums and moving people to Discord

Please stop closing forums and moving people to Discord 719 by ClawsOnPaws | 399 comments on Hacker News.

A search engine that favors text-heavy sites and punishes modern web design

A search engine that favors text-heavy sites and punishes modern web design 898 by Funes- | 239 comments on Hacker News.

Travis CI Flaw Exposes Secrets of Thousands of Open Source Projects

Image
Continuous integration vendor Travis CI has patched a serious security flaw that exposed API keys, access tokens, and credentials, potentially putting organizations that use public source code repositories at risk of further attacks. The issue — tracked as CVE-2021-41077 — concerns unauthorized access and plunder of secret environment data associated with a public open-source project during the from The Hacker News https://ift.tt/3AgIs8V via IFTTT

Three ex-US intelligence officers admit hacking for UAE

Three ex-US intelligence officers admit hacking for UAE 691 by andrewnicolalde | 222 comments on Hacker News.

Third Critical Bug Affects Netgear Smart Switches — Details and PoC Released

Image
New details have been revealed about a recently remediated critical vulnerability in Netgear smart switches that could be leveraged by an attacker to potentially execute malicious code and take control of vulnerable devices. The flaw — dubbed "Seventh Inferno" (CVSS score: 9.8) — is part of a trio of security weaknesses, called Demon's Cries (CVSS score: 9.8) and Draconian Fear (CVSS score: 7.8) from The Hacker News https://ift.tt/3nzwlAd via IFTTT

Windows MSHTML 0-Day Exploited to Deploy Cobalt Strike Beacon in Targeted Attacks

Image
Microsoft on Wednesday disclosed details of a targeting phishing campaign that leveraged a now-patched zero-day flaw in its MSHTML platform using specially-crafted Office documents to deploy Cobalt Strike Beacon on compromised Windows systems. "These attacks used the vulnerability, tracked as CVE-2021-40444, as part of an initial access campaign that distributed custom Cobalt Strike Beacon from The Hacker News https://ift.tt/2XtRTUc via IFTTT