Posts

Showing posts from October, 2021

Wacom drawing tablets track the name of every application that you open

Wacom drawing tablets track the name of every application that you open 457 by marginalia_nu | 150 comments on Hacker News.

Pre-industrial workers had a shorter workweek than today's (1991)

Pre-industrial workers had a shorter workweek than today's (1991) 434 by dihydro | 383 comments on Hacker News.

Taking apart the 2010 Fisher Price re-released Music Box Record Player

Taking apart the 2010 Fisher Price re-released Music Box Record Player 473 by fortran77 | 176 comments on Hacker News.

U.S. house prices are rising exponentially faster than income

U.S. house prices are rising exponentially faster than income 445 by MrWiffles | 704 comments on Hacker News.

Open secrets about Hacker News

Open secrets about Hacker News 487 by vincent_s | 189 comments on Hacker News.

Raspberry Pi Zero 2 W

Raspberry Pi Zero 2 W 490 by jwoglom | 91 comments on Hacker News.

Police Arrest Suspected Ransomware Hackers Behind 1,800 Attacks Worldwide

Image
12 people have been detained as part of an international law enforcement operation for orchestrating ransomware attacks on critical infrastructure and large organizations that hit over 1,800 victims across 71 countries since 2019, marking the latest action against cybercrime groups. The arrests were made earlier this week on October 26 in Ukraine and Switzerland, resulting in the seizure of cash from The Hacker News https://ift.tt/3pPUUd8 via IFTTT

The metaverse is bullshit

The metaverse is bullshit 577 by Stevvo | 343 comments on Hacker News.

Grand jury subpoena for Signal user data, Central District of California

Grand jury subpoena for Signal user data, Central District of California 554 by Sami_Lehtinen | 224 comments on Hacker News.

Architect Resigns in Protest over UCSB Mega-Dorm

Architect Resigns in Protest over UCSB Mega-Dorm 526 by danso | 550 comments on Hacker News.

This New Android Malware Can Gain Root Access to Your Smartphones

Image
An unidentified threat actor has been linked to a new Android malware strain that features the ability to root smartphones and take complete control over infected smartphones while simultaneously taking steps to evade detection. The malware has been named "AbstractEmu" owing to its use of code abstraction and anti-emulation checks to avoid running while under analysis. Notably, the global mobile from The Hacker News https://ift.tt/3motnNL via IFTTT

New 'Shrootless' Bug Could Let Attackers Install Rootkit on macOS Systems

Image
Microsoft on Thursday disclosed details of a new vulnerability that could allow an attacker to bypass security restrictions in macOS and take complete control of the device to perform arbitrary operations on the device without getting flagged by traditional security solutions. Dubbed "Shrootless" and tracked as CVE-2021-30892, the "vulnerability lies in how Apple-signed packages with from The Hacker News https://ift.tt/2ZDG3rH via IFTTT

Winter is Coming for CentOS 8

Image
Winter is Coming for CentOS 8—but here is how you can enjoy your holidays after all. The server environment is complex and if you're managing thousands of Linux servers, the last thing you want is for an operating system vendor to do something completely unexpected. That is exactly what Red Hat, the parent company of the CentOS Project, did when it suddenly announced a curtailment of support for from The Hacker News https://ift.tt/3mn51nQ via IFTTT

Russian TrickBot Gang Hacker Extradited to U.S. Charged with Cybercrime

Image
A Russian national, who was arrested in South Korea last month and extradited to the U.S. on October 20, appeared in a federal court in the state of Ohio on Thursday to face charges for his alleged role as a member of the infamous TrickBot group. Court documents showed that Vladimir Dunaev, 28, along with other members of the transnational, cybercriminal organization, stole money and from The Hacker News https://ift.tt/3mkIsjv via IFTTT

Google Releases Urgent Chrome Update to Patch 2 Actively Exploited 0-Day Bugs

Image
Google on Thursday rolled out an emergency update for its Chrome web browser, including fixes for two zero-day vulnerabilities that it says are being actively exploited in the wild. Tracked as CVE-2021-38000 and CVE-2021-38003, the weaknesses relate to insufficient validation of untrusted input in a feature called Intents as well as a case of inappropriate implementation in V8 JavaScript and from The Hacker News https://ift.tt/3Gz5L1e via IFTTT

What caused all the supply chain bottlenecks?

What caused all the supply chain bottlenecks? 493 by CalChris | 470 comments on Hacker News.

55 GiB/s FizzBuzz

55 GiB/s FizzBuzz 511 by luu | 98 comments on Hacker News.

Facebook Renames to Meta

Facebook Renames to Meta 551 by MikusR | 501 comments on Hacker News.

I was rejected by Codecademy three times, so I built my own

I was rejected by Codecademy three times, so I built my own 477 by plondon514 | 134 comments on Hacker News.

Israeli Researcher Cracked Over 3500 Wi-Fi Networks in Tel Aviv City

Image
Over 70% of Wi-Fi networks from a sample size of 5,000 were hacked with "relative ease" in the Israeli city of Tel Aviv, highlighting how unsecure Wi-Fi passwords can become a gateway for serious threats to individuals, small businesses, and enterprises alike. CyberArk security researcher Ido Hoorvitch, who used a Wi-Fi sniffing equipment costing about $50 to collect 5,000 network hashes for the from The Hacker News https://ift.tt/3Coa0df via IFTTT

A Guide to Shift Away from Legacy Authentication Protocols in Microsoft 365

Image
Microsoft 365 (M365), formerly called Office 365 (O365), is Microsoft's cloud strategy flagship product with major changes ahead, such as the deprecation of their legacy authentication protocols. Often stored on or saved to the device, Basic Authentication protocols rely on sending usernames and passwords with every request, increasing the risk of attackers capturing users' credentials, from The Hacker News https://ift.tt/3nB9v9M via IFTTT

Female African elephants are evolving without tusks due to ivory poaching

Female African elephants are evolving without tusks due to ivory poaching 459 by amrrs | 284 comments on Hacker News.

New Wslink Malware Loader Runs as a Server and Executes Modules in Memory

Image
Cybersecurity researchers on Wednesday took the wraps off a "simple yet remarkable" malware loader for malicious Windows binaries targeting Central Europe, North America and the Middle East. Codenamed "Wslink" by ESET, this previously undocumented malware stands apart from the rest in that it runs as a server and executes received modules in memory. There are no specifics available on the from The Hacker News https://ift.tt/3vQdweh via IFTTT

Malicious NPM Libraries Caught Installing Password Stealer and Ransomware

Image
Malicious actors have yet again published two more typosquatted libraries to the official NPM repository that mimic a legitimate package from Roblox, the game company, with the goal of distributing stealing credentials, installing remote access trojans, and infecting the compromised systems with ransomware. The bogus packages — named "noblox.js-proxy" and "noblox.js-proxies" — were found to from The Hacker News https://ift.tt/3BnYflK via IFTTT

GitHub Copilot available for JetBrains and Neovim

GitHub Copilot available for JetBrains and Neovim 444 by orph | 303 comments on Hacker News.

New MacBook Pro has first ‘DIY-friendly’ battery replacement design since 2012

New MacBook Pro has first ‘DIY-friendly’ battery replacement design since 2012 437 by tailspin2019 | 453 comments on Hacker News.

Bitcoin is largely controlled by a small group of investors and miners

Bitcoin is largely controlled by a small group of investors and miners 433 by CharlesW | 432 comments on Hacker News.

Giant, free index to world's research papers released online

Giant, free index to world's research papers released online 440 by webmaven | 116 comments on Hacker News.

Next.js 12

Next.js 12 433 by jacobwg | 276 comments on Hacker News.

macOS Monterey

macOS Monterey 434 by fossislife | 623 comments on Hacker News.

Which jobs most often pair together among married couples

Which jobs most often pair together among married couples 438 by thrower123 | 380 comments on Hacker News.

Edward Snowden Slams Sam Altman's Worldcoin: 'Don't Catalogue Eyeballs'

Edward Snowden Slams Sam Altman's Worldcoin: 'Don't Catalogue Eyeballs' 526 by beambot | 291 comments on Hacker News.

Element One – All of Matrix, WhatsApp, Signal and Telegram in one place

Element One – All of Matrix, WhatsApp, Signal and Telegram in one place 505 by mcjiggerlog | 382 comments on Hacker News.

Kerla: Monolithic kernel in Rust, aiming for Linux ABI compatibility

Kerla: Monolithic kernel in Rust, aiming for Linux ABI compatibility 467 by Klasiaster | 193 comments on Hacker News.

WhatsApp scaled to 1B users with only 50 engineers

WhatsApp scaled to 1B users with only 50 engineers 625 by unripe_syntax | 448 comments on Hacker News.

Hackers Using Squirrelwaffle Loader to Deploy Qakbot and Cobalt Strike

Image
A new spam email campaign has emerged as a conduit for a previously undocumented malware loader that enables the attackers to gain an initial foothold into enterprise networks and drop malicious payloads on compromised systems. "These infections are also used to facilitate the delivery of additional malware such as Qakbot and Cobalt Strike, two of the most common threats regularly observed from The Hacker News https://ift.tt/3pG4mjc via IFTTT

[eBook] The Guide to Centralized Log Management for Lean IT Security Teams

Image
One of the side effects of today’s cyber security landscape is the overwhelming volume of data security teams must aggregate and parse. Lean security teams don’t have it any easier, and the problem is compounded if they must do it manually. Data and log management are essential for organizations to gain real-time transparency and visibility into security events.  XDR provider Cynet has offered from The Hacker News https://ift.tt/3Bey6Gh via IFTTT

Cyber Attack in Iran Reportedly Cripples Gas Stations Across the Country

Image
A cyber attack in Iran left petrol stations across the country crippled, disrupting fuel sales and defacing electronic billboards to display messages challenging the regime's ability to distribute gasoline. Posts and videos circulated on social media showed messages that said, "Khamenei! Where is our gas?" — a reference to the country's supreme leader Ayatollah Ali Khamenei. Other signs read, " from The Hacker News https://ift.tt/3pIqMk6 via IFTTT

Latest Report Uncovers Supply Chain Attacks by North Korean Hackers

Image
Lazarus Group, the advanced persistent threat (APT) group attributed to the North Korean government, has been observed waging two separate supply chain attack campaigns as a means to gain a foothold into corporate networks and target a wide range of downstream entities. The latest intelligence-gathering operation involved the use of MATA malware framework as well as backdoors dubbed BLINDINGCAN  from The Hacker News https://ift.tt/3GomUKN via IFTTT

A patent troll backs off

A patent troll backs off 652 by zdw | 182 comments on Hacker News.

This word does not exist

This word does not exist 673 by adrian_mrd | 287 comments on Hacker News.

Microsoft no longer signs Windows drivers for Process Hacker

Microsoft no longer signs Windows drivers for Process Hacker 646 by XzetaU8 | 510 comments on Hacker News.

Google had a plan called “Project NERA” to turn the web into a walled garden

Google had a plan called “Project NERA” to turn the web into a walled garden 641 by vord1080 | 315 comments on Hacker News.

Feds order Google to track people searching certain names or details

Feds order Google to track people searching certain names or details 670 by ColinWright | 286 comments on Hacker News.

Over 10 Million Android Users Targeted With Premium SMS Scam Apps

Image
A global fraud campaign has been found leveraging 151 malicious Android apps with 10.5 million downloads to rope users into premium subscription services without their consent and knowledge. The premium SMS scam campaign — dubbed "UltimaSMS" — is believed to commenced in May 2021 and involved apps that cover a wide range of categories, including keyboards, QR code scanners, video and photo from The Hacker News https://ift.tt/3jFoz4Z via IFTTT

Malicious Firefox Add-ons Block Browser From Downloading Security Updates

Image
Mozilla on Monday disclosed it blocked two malicious Firefox add-ons installed by 455,000 users that were found misusing the Proxy API to impede downloading updates to the browser. The two extensions in question, named Bypass and Bypass XM, "interfered with Firefox in a way that prevented users who had installed them from downloading updates, accessing updated blocklists, and updating remotely from The Hacker News https://ift.tt/3Bfr7N2 via IFTTT

The FBI's internal guide for getting data from AT&T, T-Mobile, Verizon

The FBI's internal guide for getting data from AT&T, T-Mobile, Verizon 674 by arkadiyt | 191 comments on Hacker News.

Show HN: I built a fake VS Code to browse live cricket score in office

Show HN: I built a fake VS Code to browse live cricket score in office 651 by the2ndfloorguy | 195 comments on Hacker News.

New Attack Let Attacker Collect and Spoof Browser's Digital Fingerprints

Image
A "potentially devastating and hard-to-detect threat" could be abused by attackers to collect users' browser fingerprinting information with the goal of spoofing the victims without their knowledge, thus effectively compromising their privacy. Academics from Texas A&M University dubbed the attack system "Gummy Browsers," likening it to a nearly 20-year-old "Gummy Fingers" technique that can from The Hacker News https://ift.tt/3E8vWtm via IFTTT

Hardware-grade enterprise authentication without hardware: new SIM security solution for IAM

Image
The average cost of a data breach, according to the latest research by IBM, now stands at USD 4.24 million, the highest reported. The leading cause? Compromised credentials, often caused by human error. Although these findings continue to show an upward trend in the wrong direction, the challenge itself is not new. What is new is the unprecedented and accelerated complexity of securing the from The Hacker News https://ift.tt/3beQ4O1 via IFTTT

Microsoft Warns of Continued Supply-Chain Attacks by the Nobelium Hacker Group

Image
Nobelium, the threat actor behind the SolarWinds compromise in December 2020, has been behind a new wave of attacks that compromised 14 downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations, illustrating the adversary's continuing interest in targeting the supply chain via the "compromise-one-to-compromise-many" from The Hacker News https://ift.tt/3nI65SP via IFTTT

Hackers Exploited Popular BillQuick Billing Software to Deploy Ransomware

Image
Cybersecurity researchers on Friday disclosed a now-patched critical vulnerability in multiple versions of a time and billing system called BillQuick that's being actively exploited by threat actors to deploy ransomware on vulnerable systems. CVE-2021-42258, as the flaw is being tracked as, concerns an SQL-based injection attack that allows for remote code execution and was successfully from The Hacker News https://ift.tt/3jytuEQ via IFTTT

NYT Journalist Repeatedly Hacked with Pegasus after Reporting on Saudi Arabia

Image
The iPhone of New York Times journalist Ben Hubbard was repeatedly hacked with NSO Group's Pegasus spyware tool over a three-year period stretching between June 2018 to June 2021, resulting in infections twice in July 2020 and June 2021. The University of Toronto's Citizen Lab, which publicized the findings on Sunday, said the "targeting took place while he was reporting on Saudi Arabia, and from The Hacker News https://ift.tt/3b5955N via IFTTT

NYT journalist hacked with Pegasus after reporting on previous hacking attempts

NYT journalist hacked with Pegasus after reporting on previous hacking attempts 674 by giuliomagnifico | 206 comments on Hacker News.

Google digital advertising antitrust litigation [pdf]

Google digital advertising antitrust litigation [pdf] 635 by pg_bot | 237 comments on Hacker News.

Despite having just 5.8% sales, over 38% of bug reports come from Linux

Despite having just 5.8% sales, over 38% of bug reports come from Linux 641 by otreblan | 119 comments on Hacker News.

Google has a secret deal with FB called “Jedi Blue” that they knew was illegal

Google has a secret deal with FB called “Jedi Blue” that they knew was illegal 582 by ColinWright | 151 comments on Hacker News.

Long Beach has temporarily suspended container stacking limitations

Long Beach has temporarily suspended container stacking limitations 566 by yblu | 406 comments on Hacker News.

RSS is wonderful

RSS is wonderful 511 by todsacerdoti | 188 comments on Hacker News.

Google 'colluded' with Facebook to bypass Apple privacy

Google 'colluded' with Facebook to bypass Apple privacy 533 by webmaven | 182 comments on Hacker News.

An enormous thread on alleged Google Facebook collusion

An enormous thread on alleged Google Facebook collusion 616 by choppaface | 300 comments on Hacker News.

Ask HN: Best way to host a website for 500 years?

Ask HN: Best way to host a website for 500 years? 606 by adamkochanowicz | 753 comments on Hacker News. Say you wanted to host a personal page that can outlive you and be seen by the children of your grandchildren. Other than asking your progeny to keep paying the hosting bills, is there another way?

Police can’t demand you reveal your phone passcode then tell a jury you refused

Police can’t demand you reveal your phone passcode then tell a jury you refused 568 by oedmarap | 543 comments on Hacker News.

Magit, the magical Git interface (2017)

Magit, the magical Git interface (2017) 625 by Tomte | 336 comments on Hacker News.

The 'impossible' crane shot from Soy Cuba (1964) [video]

The 'impossible' crane shot from Soy Cuba (1964) [video] 492 by tehnub | 130 comments on Hacker News.

Fed to ban policymakers from owning individual stocks

Fed to ban policymakers from owning individual stocks 563 by awb | 217 comments on Hacker News.

California tried to save the nation from tax filing, then Intuit stepped in

California tried to save the nation from tax filing, then Intuit stepped in 498 by dv_dt | 279 comments on Hacker News.

Microsoft Warns of TodayZoo Phishing Kit Used in Extensive Credential Stealing Attacks

Image
Microsoft on Thursday disclosed an "extensive series of credential phishing campaigns" that takes advantage of a custom phishing kit that stitched together components from at least five different widely circulated ones with the goal of siphoning user login information. The tech giant's Microsoft 365 Defender Threat Intelligence Team, which detected the first instances of the tool in the wild in from The Hacker News https://ift.tt/3pvaIBT via IFTTT

Feds Reportedly Hacked REvil Ransomware Group and Forced it Offline

Image
The Russian-led REvil ransomware gang was felled by an active multi-country law enforcement operation that resulted in its infrastructure being hacked and taken offline for a second time earlier this week, in what's the latest action taken by governments to disrupt the lucrative ecosystem. The takedown was first reported by Reuters, quoting multiple private-sector cyber experts working with the from The Hacker News https://ift.tt/3jtOPze via IFTTT

Popular NPM Package Hijacked to Publish Crypto-mining Malware

Image
The U.S. Cybersecurity and Infrastructure Security Agency on Friday warned of crypto-mining malware embedded in "UAParser.js," a popular JavaScript NPM library with over 6 million weekly downloads, days after the NPM repository moved to remove three rogue packages that were found to mimic the same library. <!--adsense--> The supply-chain attack targeting the open-source library saw three from The Hacker News https://ift.tt/3Gbx01z via IFTTT

John Carmack pushes out unlocked OS for defunct Oculus Go headset

John Carmack pushes out unlocked OS for defunct Oculus Go headset 657 by JaimeThompson | 235 comments on Hacker News.

Beyond Smart

Beyond Smart 635 by razin | 409 comments on Hacker News.

'Lone Wolf' Hacker Group Targeting Afghanistan and India with Commodity RATs

Image
A new malware campaign targeting Afghanistan and India is exploiting a now-patched, 20-year-old flaw affecting Microsoft Office to deploy an array of commodity remote access trojans (RATs) that allow the adversary to gain complete control over the compromised endpoints. Cisco Talos attributed the cyber campaign to a "lone wolf" threat actor operating a Lahore-based fake IT company called Bunse from The Hacker News https://ift.tt/3pmZkYW via IFTTT

Hackers Set Up Fake Company to Get IT Experts to Launch Ransomware Attacks

Image
The financially motivated FIN7 cybercrime gang has masqueraded as yet another fictitious cybersecurity company called "Bastion Secure" to recruit unwitting software engineers under the guise of penetration testing in a likely lead-up to a ransomware scheme. "With FIN7's latest fake company, the criminal group leveraged true, publicly available information from various legitimate cybersecurity from The Hacker News https://ift.tt/3ni16YL via IFTTT

Researchers Discover Microsoft-Signed FiveSys Rootkit in the Wild

Image
A newly identified rootkit has been found with a valid digital signature issued by Microsoft that's used to proxy traffic to internet addresses of interest to the attackers for over a year targeting online gamers in China. Bucharest-headquartered cybersecurity technology company Bitdefender named the malware "FiveSys," calling out its possible credential theft and in-game-purchase hijacking from The Hacker News https://ift.tt/3ptdPKS via IFTTT

Before and After a Pen Test: Steps to Get Through It

Image
An effective cybersecurity strategy can be challenging to implement correctly and often involves many layers of security. Part of a robust security strategy involves performing what is known as a penetration test (pen test). The penetration test helps to discover vulnerabilities and weaknesses in your security defenses before the bad guys discover these. They can also help validate remedial from The Hacker News https://ift.tt/3aWWkKb via IFTTT

Willingness to Look Stupid

Willingness to Look Stupid 721 by ZephyrBlu | 428 comments on Hacker News.

Bug in Popular WinRAR Software Could Let Attackers Hack Your Computer

Image
A new security weakness has been disclosed in the WinRAR trialware file archiver utility for Windows that could be abused by a remote attacker to execute arbitrary code on targeted systems, underscoring how vulnerabilities in such software could beсome a gateway for a roster of attacks. Tracked as CVE-2021-35052, the bug impacts the trial version of the software running version 5.70. "This from The Hacker News https://ift.tt/3vziQ5F via IFTTT

Product Overview: Cynet SaaS Security Posture Management (SSPM)

Image
Software-as-a-service (SaaS) applications have gone from novelty to business necessity in a few short years, and its positive impact on organizations is clear. It’s safe to say that most industries today run on SaaS applications, which is undoubtedly positive, but it does introduce some critical new challenges to organizations.  As SaaS application use expands, as well as the number of from The Hacker News https://ift.tt/3vzgeon via IFTTT

Malicious NPM Packages Caught Running Cryptominer On Windows, Linux, macOS Devices

Image
Three JavaScript libraries uploaded to the official NPM package repository have been unmasked as crypto-mining malware, once again demonstrating how open-source software package repositories are becoming a lucrative target for executing an array of attacks on Windows, macOS, and Linux systems. The malicious packages in question — named okhsa, klow, and klown — were published by the same from The Hacker News https://ift.tt/3B0bGbG via IFTTT

Evidence for European presence in the Americas in AD 1021

Evidence for European presence in the Americas in AD 1021 569 by bcaulfield | 333 comments on Hacker News.

U.S. Government Bans Sale of Hacking Tools to Authoritarian Regimes

Image
The U.S. Commerce Department on Wednesday announced new rules barring the sales of hacking software and equipment to authoritarian regimes and potentially facilitate human rights abuse for national security (NS) and anti-terrorism (AT) reasons. The mandate, which is set to go into effect in 90 days, will forbid the export, reexport and transfer of "cybersecurity items" to countries of "national from The Hacker News https://ift.tt/3Ga93Yn via IFTTT

Hackers Stealing Browser Cookies to Hijack High-Profile YouTube Accounts

Image
Since at least late 2019, a network of hackers-for-hire have been hijacking the channels of YouTube creators, luring them with bogus collaboration opportunities to broadcast cryptocurrency scams or sell the accounts to the highest bidder. That's according to a new report published by Google's Threat Analysis Group (TAG), which said it disrupted financially motivated phishing campaigns targeting from The Hacker News https://ift.tt/3C3DvB1 via IFTTT

Two Eastern Europeans Sentenced for Providing Bulletproof Hosting to Cyber Criminals

Image
Two Eastern European nationals have been sentenced in the U.S. for offering "bulletproof hosting" services to cybercriminals, who used the technical infrastructure to distribute malware and attack financial institutions across the country between 2009 to 2015. Pavel Stassi, 30, of Estonia, and Aleksandr Shorodumov, 33, of Lithuania, have been each sentenced to 24 months and 48 months in prison, from The Hacker News https://ift.tt/3GhDmg7 via IFTTT

Vscode.dev

Vscode.dev 565 by connor4312 | 186 comments on Hacker News.

Brave Search replaces Google as default search engine in the Brave browser

Brave Search replaces Google as default search engine in the Brave browser 511 by skellertor | 355 comments on Hacker News.

Researchers Break Intel SGX With New 'SmashEx' CPU Attack Technique

Image
A newly disclosed vulnerability affecting Intel processors could be abused by an adversary to gain access to sensitive information stored within enclaves and even run arbitrary code on vulnerable systems. The vulnerability (CVE-2021-0186, CVSS score: 8.2) was discovered by a group of academics from ETH Zurich, the National University of Singapore, and the Chinese National University of Defense from The Hacker News https://ift.tt/3pjzu85 via IFTTT

Overly analytical guide to escorting

Overly analytical guide to escorting 528 by exolymph | 231 comments on Hacker News.

Google Pixel 6 and Pixel 6 Pro

Google Pixel 6 and Pixel 6 Pro 478 by mikeevans | 633 comments on Hacker News.

OWASP's 2021 List Shuffle: A New Battle Plan and Primary Foe

Image
Code injection attacks, the infamous king of vulnerabilities, have lost the top spot to broken access control as the worst of the worst, and developers need to take notice. In this increasingly chaotic world, there have always been a few constants that people could reliably count on: The sun will rise in the morning and set again at night, Mario will always be cooler than Sonic the Hedgehog, and from The Hacker News https://ift.tt/3pfrTrb via IFTTT

LightBasin Hackers Breach at Least 13 Telecom Service Providers Since 2019

Image
A highly sophisticated adversary named LightBasin has been identified as behind a string of attacks targeting the telecom sector with the goal of collecting "highly specific information" from mobile communication infrastructure, such as subscriber information and call metadata.  "The nature of the data targeted by the actor aligns with information likely to be of significant interest to signals from The Hacker News https://ift.tt/3C0u1qb via IFTTT

Study: Recycled Lithium Batteries as Good as Newly Mined

Study: Recycled Lithium Batteries as Good as Newly Mined 489 by mpweiher | 147 comments on Hacker News.

Microsoft Warns of New Security Flaw Affecting Surface Pro 3 Devices

Image
Microsoft has published a new advisory warning of a security bypass vulnerability affecting Surface Pro 3 convertible laptops that could be exploited by an adversary to introduce malicious devices within enterprise networks and defeat the device attestation mechanism. Tracked as CVE-2021-42299 (CVSS score: 5.6), the issue has been codenamed "TPM Carte Blanche" by Google software engineer Chris from The Hacker News https://ift.tt/3G43qeb via IFTTT

The FDA wants you to be able to buy a hearing aid without a prescription

The FDA wants you to be able to buy a hearing aid without a prescription 469 by cf100clunk | 343 comments on Hacker News.

First federal grant for psychedelic treatment research in 50 years

First federal grant for psychedelic treatment research in 50 years 486 by infodocket | 96 comments on Hacker News.

YouTube: filmmakers presumed guilty until maybe proven innocent

YouTube: filmmakers presumed guilty until maybe proven innocent 461 by relwin | 211 comments on Hacker News.

Thank HN: 7 years and $7M later, it all started right here

Thank HN: 7 years and $7M later, it all started right here 469 by massiarri | 58 comments on Hacker News. At BEE we develop visual builders for emails, landing pages, and more. We recorded over 5,214,407 sessions of our builders in hundreds of software applications last month. As a company, we recently passed $7m in annual recurring revenue. And it all started with this post on HN exactly seven years ago: https://ift.tt/2YWhK7M The Hacker News community took time to look at what we were doing, and provided honest and useful feedback that got us going on the right track. And we want to say THANK YOU!! Our website looked very different back then, but the 'core' was there: a visual builder to let anyone design an email, easily, quickly, with no signup, nothing to fill out, just the product. That experience remains the same today, and we stuck with it because of comments like this one we received that October 18, 2014, right here on HN: "Massive props for letting me play ar...

Squirrel Engine Bug Could Let Attackers Hack Games and Cloud Services

Image
Researchers have disclosed an out-of-bounds read vulnerability in the Squirrel programming language that can be abused by attackers to break out of the sandbox restrictions and execute arbitrary code within a SquirrelVM, thus giving a malicious actor complete access to the underlying machine.  Tracked as CVE-2021-41556, the issue occurs when a game library referred to as Squirrel Engine is used from The Hacker News https://ift.tt/3FYCbln via IFTTT

A New Variant of FlawedGrace Spreading Through Mass Email Campaigns

Image
Cybersecurity researchers on Tuesday took the wraps off a mass volume email attack staged by a prolific cybercriminal gang affecting a wide range of industries, with one of its region-specific operations notably targeting Germany and Austria. Enterprise security firm Proofpoint tied the malware campaign with high confidence to TA505, which is the name assigned to the financially motivated threat from The Hacker News https://ift.tt/3jgZKMC via IFTTT

Cybersecurity Experts Warn of a Rise in Lyceum Hacker Group Activities in Tunisia

Image
A threat actor, previously known for striking organizations in the energy and telecommunications sectors across the Middle East as early as April 2018, has evolved its malware arsenal to strike two entities in Tunisia. Security researchers at Kaspersky, who presented their findings at the VirusBulletin VB2021 conference earlier this month, attributed the attacks to a group tracked as Lyceum (aka from The Hacker News https://ift.tt/3BWlF2Y via IFTTT

Apple’s new M1 Pro and M1 Max processors

Apple’s new M1 Pro and M1 Max processors 529 by emdashcomma | 435 comments on Hacker News.

MacBook Pro 14-inch and MacBook Pro 16-inch

MacBook Pro 14-inch and MacBook Pro 16-inch 568 by 0xedb | 800 comments on Hacker News.

AWS is playing chess, Cloudflare is playing Go

AWS is playing chess, Cloudflare is playing Go 488 by pimterry | 158 comments on Hacker News.

Roger Hui has died

Roger Hui has died 536 by z0a | 43 comments on Hacker News.

HTTP is obsolete – it's time for the distributed, permanent web (2015)

HTTP is obsolete – it's time for the distributed, permanent web (2015) 483 by Hakeemmidan | 304 comments on Hacker News.

Obsidian – A knowledge base from a local folder of plain text Markdown files

Obsidian – A knowledge base from a local folder of plain text Markdown files 580 by doener | 335 comments on Hacker News.

PinePhone Pro Announced

PinePhone Pro Announced 485 by abawany | 361 comments on Hacker News.

Why Database Patching Best Practice Just Doesn't Work and How to Fix It

Image
Patching really, really matters – patching is what keeps technology solutions from becoming like big blocks of Swiss cheese, with endless security vulnerabilities punching hole after hole into critical solutions. But anyone who's spent any amount of time maintaining systems will know that patching is often easier said than done. Yes, in some instances, you can just run a command line to install from The Hacker News https://ift.tt/3DTG1u6 via IFTTT

Over 30 Countries Pledge to Fight Ransomware Attacks in US-led Global Meeting

Image
Representatives from the U.S., the European Union, and 30 other countries pledged to mitigate the risk of ransomware and harden the financial system from exploitation with the goal of disrupting the ecosystem, calling it an "escalating global security threat with serious economic and security consequences."  "From malign operations against local health providers that endanger patient care, to from The Hacker News https://ift.tt/2Xntgsn via IFTTT

REvil Ransomware Gang Goes Underground After Tor Sites Were Compromised

Image
REvil, the notorious ransomware gang behind a string of cyberattacks in recent years, appears to have gone off the radar once again, a little over a month after the cybercrime group staged a surprise return following a two-month-long hiatus. The development, first spotted by Recorded Future's Dmitry Smilyanets, comes after a member affiliated with the REvil operation posted on the XSS hacking from The Hacker News https://ift.tt/3DPOJtl via IFTTT

Is Your Data Safe? Check Out Some Cybersecurity Master Classes

Image
Since cybersecurity is definitely an issue that’s here to stay, I’ve just checked out the recently released first episodes of Cato Networks Cybersecurity Master Class Series.  According to Cato, the series aims to teach and demonstrate cybersecurity tools and best practices; provide research and real-world case studies on cybersecurity; and bring the voices and opinions of top cybersecurity from The Hacker News https://ift.tt/3C6cm0B via IFTTT

Windows 10, Linux, iOS, Chrome and Many Others at Hacked Tianfu Cup 2021

Image
Windows 10, iOS 15, Google Chrome, Apple Safari, Microsoft Exchange Server, and Ubuntu 20 were successfully broken into using original, never-before-seen exploits at the Tianfu Cup 2021, the fourth edition of the international cybersecurity contest held in the city of Chengdu, China. Targets this year included Google Chrome running on Windows 10 21H1, Apple Safari running on Macbook Pro, Adobe from The Hacker News https://ift.tt/3jbCYpv via IFTTT

Dislike button would improve Spotify's recommendations

Dislike button would improve Spotify's recommendations 551 by aww_dang | 372 comments on Hacker News.

Canon sued for disabling scanner when printers run out of ink

Canon sued for disabling scanner when printers run out of ink 564 by LordAtlas | 250 comments on Hacker News.

Most Canadians believe Facebook harms their mental health

Most Canadians believe Facebook harms their mental health 623 by elorant | 249 comments on Hacker News.

Nomad vs. Kubernetes

Nomad vs. Kubernetes 513 by capableweb | 324 comments on Hacker News.

Gitlab from YC to IPO

Gitlab from YC to IPO 611 by sandslash | 247 comments on Hacker News.

Syncthing – a continuous file synchronization program

Syncthing – a continuous file synchronization program 523 by tambourine_man | 224 comments on Hacker News.

A viable solution for Python concurrency

A viable solution for Python concurrency 673 by zorgmonkey | 283 comments on Hacker News.

Attackers Behind Trickbot Expanding Malware Distribution Channels

Image
The operators behind the pernicious TrickBot malware have resurfaced with new tricks that aim to increase its foothold by expanding its distribution channels, ultimately leading to the deployment of ransomware such as Conti. The threat actor, tracked under the monikers ITG23 and Wizard Spider, has been found to partner with other cybercrime gangs known Hive0105, Hive0106 (aka TA551 or Shathak), from The Hacker News https://ift.tt/3vetFK5 via IFTTT

Ad-Blocking Chrome Extension Caught Injecting Ads in Google Search Pages

Image
A new deceptive ad injection campaign has been found leveraging an ad blocker extension for Google Chrome and Opera web browsers to sneakily insert ads and affiliate codes on websites, according to new research from cybersecurity firm Imperva. The findings come following the discovery of rogue domains distributing an ad injection script in late August 2021 that the researchers connected to an from The Hacker News https://ift.tt/3AW1PDP via IFTTT

CISA Issues Warning On Cyber Threats Targeting Water and Wastewater Systems

Image
The U.S. Cybersecurity Infrastructure and Security Agency (CISA) on Thursday warned of continued ransomware attacks aimed at disrupting water and wastewater facilities (WWS), highlighting five incidents that occurred between March 2019 and August 2021. "This activity—which includes attempts to compromise system integrity via unauthorized access—threatens the ability of WWS facilities to provide from The Hacker News https://ift.tt/3pkyJfd via IFTTT

Oculess – Removes account requirements and telemetry from Oculus Quest devices

Oculess – Removes account requirements and telemetry from Oculus Quest devices 656 by detaro | 279 comments on Hacker News.

Apple Joins Blender Development Fund

Apple Joins Blender Development Fund 602 by dagmx | 203 comments on Hacker News.

Governor vows criminal prosecution of reporter who found flaw in state website

Governor vows criminal prosecution of reporter who found flaw in state website 642 by davidw | 316 comments on Hacker News.

Esbuild – An extremely fast JavaScript bundler

Esbuild – An extremely fast JavaScript bundler 589 by taitems | 253 comments on Hacker News.

Google: We're Tracking 270 State-Sponsored Hacker Groups From Over 50 Countries

Image
Google's Threat Analysis Group (TAG) on Thursday said it's tracking more than 270 government-backed threat actors from more than 50 countries, adding it has approximately sent 50,000 alerts of state-sponsored phishing or malware attempts to customers since the start of 2021. The warnings mark a 33% increase from 2020, the internet giant said, with the spike largely stemming from "blocking an from The Hacker News https://ift.tt/3BJUZlM via IFTTT