Posts

Showing posts from November, 2021

Twitter Bans Users From Posting ‘Private Media’ Without a Person's Consent

Twitter on Tuesday announced an expansion to its private information policy to include private media, effectively prohibiting the sharing of photos and videos without express permission from the individuals depicted in them with an aim to curb doxxing and harassment. "Beginning today, we will not allow the sharing of private media, such as images or videos of private individuals without their from The Hacker News https://ift.tt/31hl0fd via IFTTT

Ask HN: Has Google search become quantitatively worse?

Ask HN: Has Google search become quantitatively worse? 533 by itchyjunk | 319 comments on Hacker News. I used to have better time googling in the past. I struggle to find things I remember finding in the past using google. I think I might be stuck in some old habits of googling and I've lost touch with modern google. For example, google seems to want full sentences instead of just keywords now. "How do I do X?" seems to get me better(?) results then "X + some relevant keyword". But I can't seem to get past this "most popular responses" google things I need. I do appreciate youtube videos marked at certain times but watching video isn't always what I want to do. Tangentially, has youtube search been integrated to youtube search or something now? I used to be able to search obscure music in youtube. "Sal dulu a" would both recommend "Sal dulu antasma" and list it but now unless i search for that particularly, it doesn't...

New Hub for Lean IT Security Teams

One of the harsh realities of cybersecurity today is that malicious actors and attackers don’t distinguish between organizations that have seemingly endless resources and those operating with lean IT security teams. For these lean teams, meeting the challenges in the current security landscape requires constant attention, and sometimes a little support. XDR provider Cynet has built a new from The Hacker News https://ift.tt/3E8ePbz via IFTTT

Critical Wormable Security Flaw Found in Several HP Printer Models

Cybersecurity researchers on Tuesday disclosed multiple security flaws affecting 150 different multifunction printers (MFPs) from HP Inc that could be potentially abused by an adversary to take control of vulnerable devices, pilfer sensitive information, and infiltrate enterprise networks to mount other attacks. The two weaknesses — collectively called Printing Shellz — were discovered and from The Hacker News https://ift.tt/3xEltUB via IFTTT

4x Smaller, 50x Faster

4x Smaller, 50x Faster 510 by pama | 110 comments on Hacker News.

Panasonic Suffers Data Breach After Hackers Hack Into Its Network

Japanese consumer electronics giant Panasonic has disclosed a security breach wherein an unauthorized third-party broke into its network and potentially accessed data from one of its file servers. "As the result of an internal investigation, it was determined that some data on a file server had been accessed during the intrusion," the company said in a short statement published on November 26. from The Hacker News https://ift.tt/3d0O5ht via IFTTT

Unpatched Unauthorized File Read Vulnerability Affects Microsoft Windows OS

Unofficial patches have been issued to remediate an improperly patched Windows security vulnerability that could allow information disclosure and local privilege escalation (LPE) on vulnerable systems. Tracked as CVE-2021-24084 (CVSS score: 5.5), the flaw concerns an information disclosure vulnerability in the Windows Mobile Device Management component that could enable an attacker to gain from The Hacker News https://ift.tt/3rmF1f9 via IFTTT

WIRTE Hacker Group Targets Government, Law, Financial Entities in Middle East

Government, diplomatic entities, military organizations, law firms, and financial institutions primarily located in the Middle East have been targeted as part of a stealthy malware campaign as early as 2019 by making use of malicious Microsoft Excel and Word documents. Russian cybersecurity company Kaspersky attributed the attacks with high confidence to a threat actor named WIRTE, adding the from The Hacker News https://ift.tt/3ru1KFY via IFTTT

Accepted and ghosted: interviewing for a leadership position at Stripe

Accepted and ghosted: interviewing for a leadership position at Stripe 459 by danrocks | 222 comments on Hacker News. Recently I interviewed with Stripe for an engineering MoM (Manager of Managers) for one of their teams. I interview regularly, so I am used to many types of processes, feedback mechanisms, and so on. I won't go into details about the questions because there's nothing special about them, but I wanted to share some details of my experience for people thinking of interviewing there. 1) About 35-40% of the interviewers started their questioning by saying "I will only need 20 minutes for this", while emphasizing it is an important leadership position that they are hiring for. So 20 minutes is all needed to identify "important, critical leaders"? What a strange thing to say - also a GREAT way to make candidates feel important and wanted! 2) There is significant shuffling of interviewers and schedules. One almost has to be on-call to be able to r...

Winamp source code leak

Winamp source code leak 439 by svlasov | 298 comments on Hacker News.

Tiny

Tiny 496 by omarfarooq | 127 comments on Hacker News.

I resigned from Twitter

I resigned from Twitter 530 by ryzvonusef | 400 comments on Hacker News.

4 Android Banking Trojan Campaigns Targeted Over 300,000 Devices in 2021

Four different Android banking trojans were spread via the official Google Play Store between August and November 2021, resulting in more than 300,000 infections through various dropper apps that posed as seemingly harmless utility apps to take full control of the infected devices. Designed to deliver Anatsa (aka TeaBot), Alien, ERMAC, and Hydra, cybersecurity firm ThreatFabric said the malware from The Hacker News https://ift.tt/3cZeY5d via IFTTT

Firefox is the alternative to a complete Chrome hegemony

Firefox is the alternative to a complete Chrome hegemony 472 by gmemstr | 283 comments on Hacker News.

Fleet, a Lightweight IDE from JetBrains

Fleet, a Lightweight IDE from JetBrains 449 by bmc7505 | 239 comments on Hacker News.

New Chinotto Spyware Targets North Korean Defectors, Human Rights Activists

North Korean defectors, journalists who cover North Korea-related news, and entities in South Korea are being zeroed in on by a nation-state-sponsored advanced persistent threat (APT) as part of a new wave of highly-targeted surveillance attacks. Russian cybersecurity firm Kaspersky attributed the infiltrations to a North Korean hacker group tracked as ScarCruft, also known as APT37, Reaper from The Hacker News https://ift.tt/2Zx2DSG via IFTTT

CleanMyMac X: Performance and Security Software for Macbook

We use Internet-enabled devices in every aspect of our lives today—to find information, shop, bank, do homework, play games, and keep in touch with friends and family. As a result, our devices contain much personal information about us. Also, any great device will get a little clunky and slow over time and the Mac is no exception, and the whole "Macs don't get viruses" claim is a myth. Malware from The Hacker News https://ift.tt/31b9DFB via IFTTT

Hackers Using Compromised Google Cloud Accounts to Mine Cryptocurrency

Threat actors are exploiting improperly-secured Google Cloud Platform (GCP) instances to download cryptocurrency mining software to the compromised systems as well as abusing its infrastructure to install ransomware, stage phishing campaigns, and even generate traffic to YouTube videos for view count manipulation. "While cloud customers continue to face a variety of threats across applications from The Hacker News https://ift.tt/3cWUH0b via IFTTT

Indian academics throw weight behind Sci-Hub and LibGen in landmark case

Indian academics throw weight behind Sci-Hub and LibGen in landmark case 489 by ofou | 84 comments on Hacker News.

Tell HN: GitHub is down again

Tell HN: GitHub is down again 432 by pupdogg | 264 comments on Hacker News. Yet somehow https://ift.tt/2rzqrAY is ALL GREEN! smh

Interpol Arrests Over 1,000 Cyber Criminals From 20 Countries; Seizes $27 Million

A joint four-month operation coordinated by Interpol, the international criminal police organization, has culminated in the arrests of more than 1,000 cybercriminals and the recovery of $27 million in illicit proceeds. Codenamed "HAECHI-II," the crackdown enabled law enforcement units from across 20 countries, as well as Hong Kong and Macao, close 1,660 cases alongside blocking 2,350 bank from The Hacker News https://ift.tt/3E6fVVj via IFTTT

Books that changed my career as a software engineer

Books that changed my career as a software engineer 506 by julianogtz | 240 comments on Hacker News.

Proof of stake is a scam and the people promoting it are scammers

Proof of stake is a scam and the people promoting it are scammers 469 by alg0rith | 386 comments on Hacker News.

Zillow lost money because they weren't willing to lose money

Zillow lost money because they weren't willing to lose money 447 by mjmayank | 317 comments on Hacker News.

Ask HN: What are the best-designed things you've ever used?

Ask HN: What are the best-designed things you've ever used? 433 by whitepoplar | 887 comments on Hacker News. I'll go first. I think the Bialetti Brikka is exceptional: https://ift.tt/3raNZMj...

The fish shell is amazing

The fish shell is amazing 434 by RMPR | 283 comments on Hacker News.

OpenLGTV: Legal reverse engineering and research of LG TVs firmware

OpenLGTV: Legal reverse engineering and research of LG TVs firmware 590 by transpute | 296 comments on Hacker News.

Greening of the Earth Mitigates Surface Warming (2020)

Greening of the Earth Mitigates Surface Warming (2020) 433 by themantra514 | 281 comments on Hacker News.

Apple will notify users about state-sponsored cybersecurity threats

Apple will notify users about state-sponsored cybersecurity threats 527 by evercast | 148 comments on Hacker News.

Italy's Antitrust Regulator Fines Google and Apple for "Aggressive" Data Practices

Italy's antitrust regulator has fined both Apple and Google €10 million each for what it calls are "aggressive" data practices and for not providing consumers with clear information on commercial uses of their personal data during the account creation phase. The Autorità Garante della Concorrenza e del Mercato (AGCM) said "Google and Apple did not provide clear and immediate information on the from The Hacker News https://ift.tt/3CWRzfi via IFTTT

Einstein award going to Paul Ginsparg for creating arXiv.org

Einstein award going to Paul Ginsparg for creating arXiv.org 608 by endymi0n | 45 comments on Hacker News.

Hackers Targeting Biomanufacturing Facilities With Tardigrade Malware

An advanced persistent threat (APT) has been linked to cyberattacks on two biomanufacturing companies that occurred this year with the help of a custom malware loader called "Tardigrade." That's according to an advisory published by Bioeconomy Information Sharing and Analysis Center (BIO-ISAC) this week, which noted that the malware is actively spreading across the sector with the likely goal of from The Hacker News https://ift.tt/3CUwu56 via IFTTT

90% of Black Friday deals were the same price or cheaper six months before

90% of Black Friday deals were the same price or cheaper six months before 608 by belter | 206 comments on Hacker News.

Crypto Hackers Using Babadeda Crypter to Make Their Malware Undetectable

A new malware campaign has been discovered targeting cryptocurrency, non-fungible token (NFT), and DeFi aficionados through Discord channels to deploy a crypter named "Babadeda" that's capable of bypassing antivirus solutions and stage a variety of attacks. "[T]his malware installer has been used in a variety of recent campaigns to deliver information stealers, RATs, and even LockBit ransomware, from The Hacker News https://ift.tt/3nUsQEa via IFTTT

CronRAT: A New Linux Malware That’s Scheduled to Run on February 31st

Researchers have unearthed a new remote access trojan (RAT) for Linux that employs a never-before-seen stealth technique that involves masking its malicious actions by scheduling them for execution on February 31st, a non-existent calendar day. Dubbed CronRAT, the sneaky malware "enables server-side Magecart data theft which bypasses browser-based security solutions," Sansec Threat Research said from The Hacker News https://ift.tt/3HSqPAh via IFTTT

New German government calls for European ban on biometric mass surveillance

New German government calls for European ban on biometric mass surveillance 571 by giuliomagnifico | 131 comments on Hacker News.

Israel Bans Sales of Hacking and Surveillance Tools to 65 Countries

Israel's Ministry of Defense has dramatically restricted the number of countries to which cybersecurity firms in the country are allowed to sell offensive hacking and surveillance tools to, cutting off 65 nations from the export list. The revised list, details of which were first reported by the Israeli business newspaper Calcalist, now only includes 37 countries, down from the previous 102: from The Hacker News https://ift.tt/313L2Th via IFTTT

Underrated Reasons to Be Thankful

Underrated Reasons to Be Thankful 593 by dynm | 201 comments on Hacker News.

Product Releases Should Not Be Scary

Every Product Manager and Software Developer should know that pushing feature updates to production via traditional channels is as archaic as painting on cave walls. The smart are always quick to adapt to new, innovative technologies, and this mindset is exactly what makes normal companies great. The landscape is changing fast, especially in IT. Change isn't just necessary, but more often than from The Hacker News https://ift.tt/3nPFO5X via IFTTT

This New Stealthy JavaScript Loader Infecting Computers with Malware

Threat actors have been found using a previously undocumented JavaScript malware strain that functions as a loader to distribute an array of remote access Trojans (RATs) and information stealers. HP Threat Research dubbed the new, evasive loader "RATDispenser," with the malware responsible for deploying at least eight different malware families in 2021. Around 155 samples of this new malware from The Hacker News https://ift.tt/3ra1oo8 via IFTTT

Hackers Using Microsoft MSHTML Flaw to Spy on Targeted PCs with Malware

A new Iranian threat actor has been discovered exploiting a now-addressed critical flaw in the Microsoft Windows MSHTML platform to target Farsi-speaking victims with a new PowerShell-based information stealer designed to harvest extensive details from infected machines. "[T]he stealer is a PowerShell script, short with powerful collection capabilities — in only ~150 lines, it provides the from The Hacker News https://ift.tt/30T0BgE via IFTTT

Tell HN: Happy Thanksgiving Everyone

Tell HN: Happy Thanksgiving Everyone 550 by mr_o47 | 106 comments on Hacker News. I have been really thankful for hackernews. This place has been full of great knowledge and people. I really appreciate the efforts of the people who are running this platform. HAPPY THANKSGIVING

If You're Not Using Antivirus Software, You're Not Paying Attention

Stop tempting fate and take a look at our picks for the best antivirus programs on the market today. Every year there are billions of malware attacks worldwide. And these threats are constantly evolving. So if you are not currently using antivirus software, or you still rely on some free software you downloaded back in 2017, you are putting your cybersecurity in serious jeopardy.  Need help from The Hacker News https://ift.tt/3cNMw6g via IFTTT

Warning — Hackers Exploiting New Windows Installer Zero-Day Exploit in the Wild

Attackers are actively making efforts to exploit a new variant of a recently disclosed privilege escalation vulnerability to potentially execute arbitrary code on fully-patched systems, once again demonstrating how adversaries move quickly to weaponize a publicly available exploit. Cisco Talos disclosed that it "detected malware samples in the wild that are attempting to take advantage of this from The Hacker News https://ift.tt/3cSHNA9 via IFTTT

VMware Warns of Newly Discovered Vulnerabilities in vSphere Web Client

VMware has shipped updates to address two security vulnerabilities in vCenter Server and Cloud Foundation that could be abused by a remote attacker to gain access to sensitive information. The more severe of the issues concerns an arbitrary file read vulnerability in the vSphere Web Client. Tracked as CVE-2021-21980, the bug has been rated 7.5 out of a maximum of 10 on the CVSS scoring system, from The Hacker News https://ift.tt/3p2Sm9P via IFTTT

Samsung plans $17B chip plant in Taylor, Texas

Samsung plans $17B chip plant in Taylor, Texas 514 by kungfudoi | 370 comments on Hacker News.

QOI: Lossless Image Compression in O(n) Time

QOI: Lossless Image Compression in O(n) Time 500 by Ragnarork | 157 comments on Hacker News.

Things I learned from building a production database

Things I learned from building a production database 475 by dangoldin | 100 comments on Hacker News.

Cocaine Paraphernalia Ads in the 70s

Cocaine Paraphernalia Ads in the 70s 546 by mrzool | 478 comments on Hacker News.

The World's Deadliest Thing

The World's Deadliest Thing 535 by mkeeter | 217 comments on Hacker News.

Eavesdropping Bugs in MediaTek Chips Affect 37% of All Smartphones and IoT Globally

Multiple security weaknesses have been disclosed in MediaTek system-on-chips (SoCs) that could have enabled a threat actor to elevate privileges and execute arbitrary code in the firmware of the audio processor, effectively allowing the attackers to carry out a "massive eavesdrop campaign" without the users' knowledge. The discovery of the flaws is the result of reverse-engineering the Taiwanese from The Hacker News https://ift.tt/3xngqrt via IFTTT

APT C-23 Hackers Using New Android Spyware Variant to Target Middle East Users

A threat actor known for striking targets in the Middle East has evolved its Android spyware yet again with enhanced capabilities that allow it to be stealthier and more persistent while passing off as seemingly innocuous app updates to stay under the radar. The new variants have "incorporated new features into their malicious apps that make them more resilient to actions by users, who might try from The Hacker News https://ift.tt/3oWcES7 via IFTTT

Webinar and eBook: The Dark Side of EDR. Are You Prepared?

Endpoint Detection and Response (EDR) platforms have received incredible attention as the platform for security teams. Whether you're evaluating an EDR for the first time or looking to replace your EDR, as an information security professional, you need to be aware of the gaps prior already to implementation so you can best prepare how to close the gaps. It's important to understand that each from The Hacker News https://ift.tt/3tFsRN0 via IFTTT

Over 9 Million Android Phones Running Malware Apps from Huawei's AppGallery

At least 9.3 million Android devices have been infected by a new class of malware that disguises itself as dozens of arcade, shooter, and strategy games on Huawei's AppGallery marketplace to steal device information and victims' mobile phone numbers. The mobile campaign was disclosed by researchers from Doctor Web, who classified the trojan as "Android.Cynos.7.origin," owing to the fact that the from The Hacker News https://ift.tt/3oYs1cK via IFTTT

Apple Sues Israel's NSO Group for Spying on iPhone Users With Pegasus Spyware

Apple has sued NSO Group and its parent company Q Cyber Technologies in a U.S. federal court holding it accountable for illegally targeting users with its Pegasus surveillance tool, marking yet another setback for the Israeli spyware vendor. The Cupertino-based tech giant painted NSO Group as "notorious hackers — amoral 21st century mercenaries who have created highly sophisticated from The Hacker News https://ift.tt/2ZgQMbh via IFTTT

Boards are dangerous to founder/CEOs

Boards are dangerous to founder/CEOs 574 by tosh | 264 comments on Hacker News.

Apple sues NSO Group to curb the abuse of state-sponsored spyware

Apple sues NSO Group to curb the abuse of state-sponsored spyware 559 by todsacerdoti | 208 comments on Hacker News.

Full key extraction of Nvidia TSEC

Full key extraction of Nvidia TSEC 536 by vitplister | 130 comments on Hacker News.

Remix – A framework focused on web fundamentals and modern UX

Remix – A framework focused on web fundamentals and modern UX 526 by canyonero | 254 comments on Hacker News.

What Avengers Movies Can Teach Us About Cybersecurity

Marvel has been entertaining us for the last 20 years. We have seen gods, super-soldiers, magicians, and other irradiated heroes fight baddies at galactic scales. The eternal fight of good versus evil. A little bit like in cybersecurity, goods guys fighting cybercriminals.If we choose to go with this fun analogy, is there anything useful we can learn from those movies? World-ending baddies from The Hacker News https://ift.tt/3xhtz5f via IFTTT

Researchers Detail Privilege Escalation Bugs Reported in Oracle VirtualBox

A now-patched vulnerability affecting Oracle VM VirtualBox could be potentially exploited by an adversary to compromise the hypervisor and cause a denial-of-service (DoS) condition. "Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox," the advisory reads. "Successful attacks of from The Hacker News https://ift.tt/3r3hQq3 via IFTTT

More Stealthier Version of BrazKing Android Malware Spotted in the Wild

Banking apps from Brazil are being targeted by a more elusive and stealthier version of an Android remote access trojan (RAT) that's capable of carrying out financial fraud attacks by stealing two-factor authentication (2FA) codes and initiating rogue transactions from infected devices to transfer money from victims' accounts to an account operated by the threat actor. IBM X-Force dubbed the from The Hacker News https://ift.tt/30T0eCA via IFTTT

The Importance of IT Security in Your Merger Acquisition

In the business world, mergers and acquisitions are commonplace as businesses combine, acquire, and enter various partnerships. Mergers and Acquisitions (M&A) are filled with often very complicated and complex processes to merge business processes, management, and a whole slew of other aspects of combining two businesses into a single logical entity. In the modern business world before and after from The Hacker News https://ift.tt/3nEKZWp via IFTTT

GoDaddy Data Breach Exposes Over 1 Million WordPress Customers' Data

Web hosting giant GoDaddy on Monday disclosed a data breach that resulted in the unauthorized access of data belonging to a total of 1.2 million active and inactive customers, making it the third security incident to come to light since 2018. In a filing with the U.S. Securities and Exchange Commission (SEC), the world's largest domain registrar said that a malicious third-party managed to gain from The Hacker News https://ift.tt/3cHQTzT via IFTTT

Fingerprints can be hacked

Fingerprints can be hacked 521 by SerCe | 218 comments on Hacker News.

The Stroad

The Stroad 504 by PaulHoule | 311 comments on Hacker News.

Rust Moderation Team Resigns

Rust Moderation Team Resigns 609 by hasheddan | 543 comments on Hacker News.

New Golang-based Linux Malware Targeting eCommerce Websites

Weaknesses in e-commerce portals are being exploited to deploy a Linux backdoor as well as a credit card skimmer that's capable of stealing payment information from compromised websites. "The attacker started with automated e-commerce attack probes, testing for dozens of weaknesses in common online store platforms," researchers from Sansec Threat Research said in an analysis. "After a day and a from The Hacker News https://ift.tt/3oQ0hHd via IFTTT

Hackers Exploiting ProxyLogon and ProxyShell Flaws in Spam Campaigns

Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign that leverages stolen email chains to bypass security software and deploy malware on vulnerable systems. The findings come from Trend Micro following an investigation into a number of intrusions in the Middle East that culminated in the distribution of a from The Hacker News https://ift.tt/3oOsoGH via IFTTT

Facebook Postpones Plans for E2E Encryption in Messenger, Instagram Until 2023

Meta, the parent company of Facebook, Instagram, and WhatsApp, disclosed that it doesn't intend to roll out default end-to-end encryption (E2EE) across all its messaging services until 2023, pushing its original plans by at least a year. "We're taking our time to get this right and we don't plan to finish the global rollout of end-to-end encryption by default across all our messaging services from The Hacker News https://ift.tt/3czCQfs via IFTTT

Only 90s web developers remember this (2014)

Only 90s web developers remember this (2014) 518 by Fiveplus | 295 comments on Hacker News.

Advent of Code 2021

Advent of Code 2021 499 by amenghra | 108 comments on Hacker News.

Microsoft Edge’s new ‘Buy now, pay later’ feature is the definition of bloatware

Microsoft Edge’s new ‘Buy now, pay later’ feature is the definition of bloatware 477 by JCWasmx86 | 314 comments on Hacker News.

Ask HN: I feel so shallow and dumb when I see what other smart people are doing

Ask HN: I feel so shallow and dumb when I see what other smart people are doing 465 by cdahmedeh | 318 comments on Hacker News. I was watching a video game documentary about the history of the RollerCoaster Tycoon franchise, a theme park management game that had both an easy learning curve but with incredibly sophisticated dynamics. What really impressed me however was the origins of the first two titles: written by one man in assembly language. At that point, I realized how mediocre and untalented I was. Nothing I’m doing in my life are anything that people will remember me for. Throughout my life, I’ve seen many awe inspiring projects done by extremely talented people, way more intelligent than I am, come to fruition. Over the years, I realized how shallow and dumb I really am. I’m uninteresting. Most of my career revolved around software development, something that I’ve done since I was 17 (now I'm 30) until a few years ago. I found myself writing entreprise software usually ...

RedCurl Corporate Espionage Hackers Return With Updated Hacking Tools

A corporate cyber-espionage hacker group has resurfaced after a seven-month hiatus with new intrusions targeting four companies this year, including one of the largest wholesale stores in Russia, while simultaneously making tactical improvements to its toolset in an attempt to thwart analysis. "In every attack, the threat actor demonstrates extensive red teaming skills and the ability to bypass from The Hacker News https://ift.tt/3kU6VLu via IFTTT

North Korean Hackers Found Behind a Range of Credential Theft Campaigns

A threat actor with ties to North Korea has been linked to a prolific wave of credential theft campaigns targeting research, education, government, media and other organizations, with two of the attacks also attempting to distribute malware that could be used for intelligence gathering. Enterprise security firm Proofpoint attributed the infiltrations to a group it tracks as TA406, and by the from The Hacker News https://ift.tt/3nzYhTY via IFTTT

Vertiwalk Vertical Walking

Vertiwalk Vertical Walking 460 by hliyan | 82 comments on Hacker News.

Tldraw – a tiny little drawing app

Tldraw – a tiny little drawing app 446 by ChrisArchitect | 111 comments on Hacker News.

Crypto Wash Trading

Crypto Wash Trading 541 by paulpauper | 291 comments on Hacker News.

Show HN: Pony – a messenger for mindful correspondence

Show HN: Pony – a messenger for mindful correspondence 575 by dmitryminkovsky | 202 comments on Hacker News.

Elfshaker: Version control system fine-tuned for binaries

Elfshaker: Version control system fine-tuned for binaries 518 by jim90 | 107 comments on Hacker News.

Tasking developers with creating detailed estimates is a waste of time (2020)

Tasking developers with creating detailed estimates is a waste of time (2020) 453 by lauriswtf | 251 comments on Hacker News.

Twitter rolls back AMP support, no longer sends users to AMP pages

Twitter rolls back AMP support, no longer sends users to AMP pages 544 by twapi | 101 comments on Hacker News.

10 years of whatever this has been

10 years of whatever this has been 462 by zdw | 680 comments on Hacker News.

Stacked changes: how FB and Google engineers stay unblocked and ship faster

Stacked changes: how FB and Google engineers stay unblocked and ship faster 461 by tomasreimers | 278 comments on Hacker News.

SerenityOS demo at Handmade Seattle 2021 [video]

SerenityOS demo at Handmade Seattle 2021 [video] 661 by akling | 144 comments on Hacker News.

11 Malicious PyPI Python Libraries Caught Stealing Discord Tokens and Installing Shells

Cybersecurity researchers have uncovered as many as 11 malicious Python packages that have been cumulatively downloaded more than 41,000 times from the Python Package Index (PyPI) repository, and could be exploited to steal Discord access tokens, passwords, and even stage dependency confusion attacks. The Python packages have since been removed from the repository following responsible from The Hacker News https://ift.tt/3csxvqe via IFTTT

U.S. Charged 2 Iranian Hackers for Threatening Voters During 2020 Presidential Election

The U.S. government on Thursday unsealed an indictment that accused two Iranian nationals of their involvement in cyber-enabled disinformation and threat campaign orchestrated to interfere in the 2020 presidential elections by gaining access to confidential voter information from at least one state election website. The two defendants in question — Seyyed Mohammad Hosein Musa Kazemi, 24, and from The Hacker News https://ift.tt/3DxzMMQ via IFTTT

FBI Issues Flash Alert on Actively Exploited FatPipe VPN Zero-Day Bug

The U.S. Federal Bureau of Investigation (FBI) has disclosed that an unidentified threat actor has been exploiting a previously unknown weakness in the FatPipe MPVPN networking devices at least since May 2021 to obtain an initial foothold and maintain persistent access into vulnerable networks, making it the latest company to join the likes of Cisco, Fortinet, Citrix, Pulse Secure that have had from The Hacker News https://ift.tt/3qSkqio via IFTTT

A Simple 5-Step Framework to Minimize the Risk of a Data Breach

Today's businesses run on data. They collect it from customers at every interaction, and they use it to improve efficiency, increase their agility, and provide higher levels of service. But it's becoming painfully obvious that all of that data businesses collect has also made them an enticing target for cybercriminals. With each passing day, the evidence of that grows. In the last few months, from The Hacker News https://ift.tt/3DCBKM0 via IFTTT

Spy camera detection using smartphone time-of-flight sensors

Spy camera detection using smartphone time-of-flight sensors 639 by Nirali_Feige | 185 comments on Hacker News.

Experts Expose Secrets of Conti Ransomware Group That Made 25 Million from Victims

The clearnet and dark web payment portals operated by the Conti ransomware group have gone down in what appears to be an attempt to shift to new infrastructure after details about the gang's inner workings and its members were made public. According to MalwareHunterTeam, "while both the clearweb and Tor domains of the leak site of the Conti ransomware gang is online and working, both their from The Hacker News https://ift.tt/30J8wN6 via IFTTT

New Side Channel Attacks Re-Enable Serious DNS Cache Poisoning Attacks

Researchers have demonstrated yet another variant of the SAD DNS cache poisoning attack that leaves about 38% of the domain name resolvers vulnerable, enabling attackers to redirect traffic originally destined to legitimate websites to a server under their control. "The attack allows an off-path attacker to inject a malicious DNS record into a DNS cache," University of California researchers from The Hacker News https://ift.tt/3cqtSRN via IFTTT

Critical Root RCE Bug Affects Multiple Netgear SOHO Router Models

Networking equipment company Netgear has released yet another round of patches to remediate a high-severity remote code execution vulnerability affecting multiple routers that could be exploited by remote attackers to take control of an affected system. Tracked as CVE-2021-34991 (CVSS score: 8.8), the pre-authentication buffer overflow flaw in small office and home office (SOHO) routers can lead from The Hacker News https://ift.tt/3oCLI9P via IFTTT

How to Build a Security Awareness Training Program that Yields Measurable Results

Organizations have been worrying about cyber security since the advent of the technological age. Today, digital transformation coupled with the rise of remote work has made the need for security awareness all the more critical. Cyber security professionals are continuously thinking about how to prevent cyber security breaches from happening, with employees and contractors often proving to be the from The Hacker News https://ift.tt/30Gt5tM via IFTTT

Show HN: I made a Chrome extension that can automate any website

Show HN: I made a Chrome extension that can automate any website 558 by dkthehuman | 174 comments on Hacker News.

Microsoft Warns about 6 Iranian Hacking Groups Turning to Ransomware

Nation-state operators with nexus to Iran are increasingly turning to ransomware as a means of generating revenue and intentionally sabotaging their targets, while also engaging in patient and persistent social engineering campaigns and aggressive brute force attacks. No less than six threat actors affiliated with the West Asian country have been discovered deploying ransomware to achieve their from The Hacker News https://ift.tt/3wWfwSy via IFTTT

How to grow sodium chloride crystals at home

How to grow sodium chloride crystals at home 575 by kdavis | 100 comments on Hacker News.

Ivermectin: Much More Than You Wanted to Know

Ivermectin: Much More Than You Wanted to Know 559 by 4monthsaway | 518 comments on Hacker News.

U.S., U.K. and Australia Warn of Iranian Hackers Exploiting Microsoft, Fortinet Flaws

Cybersecurity agencies from Australia, the U.K., and the U.S. on Wednesday released a joint advisory warning of active exploitation of Fortinet and Microsoft Exchange ProxyShell vulnerabilities by Iranian state-sponsored actors to gain initial access to vulnerable systems for follow-on activities, including data exfiltration and ransomware. The threat actor is believed to have leveraged multiple from The Hacker News https://ift.tt/2YTjn6i via IFTTT

Apple announces Self Service Repair

Apple announces Self Service Repair 572 by todsacerdoti | 197 comments on Hacker News.

Microsoft Calls Firefox’s Browser Workaround “Improper,” Will Block It

Microsoft Calls Firefox’s Browser Workaround “Improper,” Will Block It 528 by Vinnl | 294 comments on Hacker News.

Hackers Targeting Myanmar Use Domain Fronting to Hide Malicious Activities

A malicious campaign has been found leveraging a technique called domain fronting to hide command-and-control traffic by leveraging a legitimate domain owned by the Myanmar government to route communications to an attacker-controlled server with the goal of evading detection. The threat, which was observed in September 2021, deployed Cobalt Strike payloads as a stepping stone for launching from The Hacker News https://ift.tt/3qHR5r3 via IFTTT

“Click to subscribe, call to cancel” is illegal, FTC says

“Click to subscribe, call to cancel” is illegal, FTC says 513 by spzx | 178 comments on Hacker News.

Israel's Candiru Spyware Found Linked to Watering Hole Attacks in U.K and Middle East

Israeli spyware vendor Candiru, which was added to an economic blocklist by the U.S. government this month, is said to have reportedly waged "watering hole" attacks against high-profile entities in the U.K. and the Middle East, new findings reveal. "The victimized websites belong to media outlets in the U.K., Yemen, and Saudi Arabia, as well as to Hezbollah; to government institutions in Iran ( from The Hacker News https://ift.tt/3wU0LQc via IFTTT

On-Demand Webinar: Into the Cryptoverse

In the span of a few years, cryptocurrencies have gone from laughingstock and novelty to a serious financial instrument, and a major sector in high-tech. The price of Bitcoin and Ethereum has gone from single dollars to thousands, and they’re increasingly in the mainstream.  This is undoubtedly a positive development, as it opens new avenues for finance, transactions, tech developments, and more from The Hacker News https://ift.tt/3cpGlVG via IFTTT

Facebook Bans Pakistani and Syrian Hacker Groups for Abusing its Platform

Meta, the company formerly known as Facebook, announced Tuesday that it took action against four separate malicious cyber groups from Pakistan and Syria who were found targeting people in Afghanistan, as well as journalists, humanitarian organizations, and anti-regime military forces in the West Asian country. The Pakistani threat actor, dubbed SideCopy, is said to have used the platform to from The Hacker News https://ift.tt/3DkbnKF via IFTTT

Security issue related to the NPM registry

Security issue related to the NPM registry 477 by ManuelKiessling | 171 comments on Hacker News.

I hate password rules

I hate password rules 451 by CapitalistCartr | 363 comments on Hacker News.

There is currently no way to drive between Vancouver and the rest of Canada

There is currently no way to drive between Vancouver and the rest of Canada 423 by actually_a_dog | 259 comments on Hacker News.

New Blacksmith Exploit Bypasses Current Rowhammer Attack Defenses

Cybersecurity researchers have demonstrated yet another variation of the Rowhammer attack affecting all DRAM (dynamic random-access memory) chips that bypasses currently deployed mitigations, thereby effectively compromising the security of the devices. The new technique — dubbed "Blacksmith" (CVE-2021-42114, CVSS score: 9.0) — is designed to trigger bit flips on target refresh rate-enabled DRAM from The Hacker News https://ift.tt/3DmGVzn via IFTTT

Space debris forces astronauts on space station to take shelter in return ships

Space debris forces astronauts on space station to take shelter in return ships 457 by tosh | 373 comments on Hacker News.

Researchers Demonstrate New Way to Detect MITM Phishing Kits in the Wild

No fewer than 1,220 Man-in-the-Middle (MitM) phishing websites have been discovered as targeting popular online services like Instagram, Google, PayPal, Apple, Twitter, and LinkedIn with the goal of hijacking users' credentials and carrying out further follow-on attacks. The findings come from a new study undertaken by a group of researchers from Stony Brook University and Palo Alto Networks, from The Hacker News https://ift.tt/3oyyhHZ via IFTTT

Notorious Emotet Botnet Makes a Comeback with the Help of TrickBot Malware

The notorious Emotet malware is staging a comeback of sorts nearly 10 months after a coordinated law enforcement operation dismantled its command-and-control infrastructure in late January 2021. According to a new report from security researcher Luca Ebach, the infamous TrickBot malware is being used as an entry point to distribute what appears to be a new version of Emotet on systems previously from The Hacker News https://ift.tt/3DqBgIM via IFTTT

Individuals Matter

Individuals Matter 448 by benfrederickson | 207 comments on Hacker News.

New 'Moses Staff' Hacker Group Targets Israeli Companies With Destructive Attacks

A new politically-motivated hacker group named "Moses Staff" has been linked to a wave of targeted attacks targeting Israeli organizations since September 2021 with the goal of plundering and leaking sensitive information prior to encrypting their networks, with no option to regain access or negotiate a ransom. "The group openly states that their motivation in attacking Israeli companies is to from The Hacker News https://ift.tt/3CkuGCc via IFTTT

SharkBot — A New Android Trojan Stealing Banking and Cryptocurrency Accounts

Cybersecurity researchers on Monday took the wraps off a new Android trojan that takes advantage of accessibility features on the devices to siphon credentials from banking and cryptocurrency services in Italy, the U.K., and the U.S. Dubbed "SharkBot" by Cleafy, the malware is designed to strike a total of 27 targets — counting 22 unnamed international banks in Italy and the U.K. as well as five from The Hacker News https://ift.tt/30qEcHf via IFTTT

YouTube takes down independent court livestreams

YouTube takes down independent court livestreams 432 by crocodiletears | 295 comments on Hacker News.

macOS Monterey's new network quality tool is surprisingly good

macOS Monterey's new network quality tool is surprisingly good 414 by danpetrov | 78 comments on Hacker News.

Blacksmith – Rowhammer bit flips on all DRAM devices today despite mitigations

Blacksmith – Rowhammer bit flips on all DRAM devices today despite mitigations 457 by buran77 | 207 comments on Hacker News.

Bar-tailed Godwits regularly travel more than 7,000 miles non-stop

Bar-tailed Godwits regularly travel more than 7,000 miles non-stop 416 by mcenedella | 183 comments on Hacker News.

Xerox scanners/photocopiers randomly alter numbers in scanned documents (2013)

Xerox scanners/photocopiers randomly alter numbers in scanned documents (2013) 453 by SergeAx | 170 comments on Hacker News.

Debugging memory corruption: who the hell writes “2” into my stack? (2016)

Debugging memory corruption: who the hell writes “2” into my stack? (2016) 395 by darknavi | 141 comments on Hacker News.

U.S. states file updated antitrust complaint against Google

U.S. states file updated antitrust complaint against Google 409 by mancerayder | 243 comments on Hacker News.

Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted Traffic

A new analysis of website fingerprinting (WF) attacks aimed at the Tor web browser has revealed that it's possible for an adversary to glean a website frequented by a victim, but only in scenarios where the threat actor is interested in a specific subset of the websites visited by users. "While attacks can exceed 95% accuracy when monitoring a small set of five popular websites, indiscriminate ( from The Hacker News https://ift.tt/3ngXQxS via IFTTT

North Korean Hackers Target Cybersecurity Researchers with Trojanized IDA Pro

Lazarus, the North Korea-affiliated state-sponsored group, is attempting to once again target security researchers with backdoors and remote access trojans using a trojanized pirated version of the popular IDA Pro reverse engineering software. The findings were reported by ESET security researcher Anton Cherepanov last week in a series of tweets. IDA Pro is an Interactive Disassembler that's from The Hacker News https://ift.tt/3qDnC1f via IFTTT

How to Tackle SaaS Security Misconfigurations

Whether it's Office 365, Salesforce, Slack, GitHub or Zoom, all SaaS apps include a host of security features designed to protect the business and its data. The job of ensuring these apps' security settings are properly configured falls on the security team. The challenge lies within how burdensome this responsibility is — each app has tens or hundreds of security settings to configure, in from The Hacker News https://ift.tt/3DhEAFX via IFTTT

FBI's Email System Hacked to Send Out Fake Cyber Security Alert to Thousands

The U.S. Federal Bureau of Investigation (FBI) on Saturday confirmed unidentified threat actors have breached one of its email servers to blast hoax messages about a fake "sophisticated chain attack." The incident, which was first publicly disclosed by threat intelligence non-profit SpamHaus, involved sending rogue warning emails with the subject line "Urgent: Threat actor in systems" from The Hacker News https://ift.tt/326Fisd via IFTTT

The bullet effects in Terminator 2 weren’t CGI

The bullet effects in Terminator 2 weren’t CGI 455 by zdw | 135 comments on Hacker News.

Hoax email blast abused poor coding in FBI website

Hoax email blast abused poor coding in FBI website 393 by todsacerdoti | 91 comments on Hacker News.

Reverse-engineering the Yamaha DX7 synthesizer's sound chip from die photos

Reverse-engineering the Yamaha DX7 synthesizer's sound chip from die photos 389 by picture | 121 comments on Hacker News.

Restic – Backups Done Right

Restic – Backups Done Right 502 by IceWreck | 259 comments on Hacker News.

Sign arbitrary data with your SSH keys

Sign arbitrary data with your SSH keys 603 by h1x | 295 comments on Hacker News.

Email from FBI Looks Odd

Email from FBI Looks Odd 456 by jacksoncloud | 155 comments on Hacker News.

ISO should make all standards Publicly Available

ISO should make all standards Publicly Available 547 by yegle | 172 comments on Hacker News.

Useful sed scripts and patterns

Useful sed scripts and patterns 515 by adrianscheff | 118 comments on Hacker News.

Show HN: Long Range E-Bike

Show HN: Long Range E-Bike 611 by jacquesm | 464 comments on Hacker News.

Hackers Increasingly Using HTML Smuggling in Malware and Phishing Attacks

Threat actors are increasingly banking on the technique of HTML smuggling in phishing campaigns as a means to gain initial access and deploy an array of threats, including banking malware, remote administration trojans (RATs), and ransomware payloads. Microsoft 365 Defender Threat Intelligence Team, in a new report published Thursday, disclosed that it identified infiltrations distributing the  from The Hacker News https://ift.tt/3oljZu9 via IFTTT

The gradual extinction of softness

The gradual extinction of softness 575 by flabber | 113 comments on Hacker News.

How to make a CPU – a simple picture-based explanation

How to make a CPU – a simple picture-based explanation 577 by robertelder | 161 comments on Hacker News.

Business Essentials

Business Essentials 592 by judge2020 | 306 comments on Hacker News.

3D printed mirror array

3D printed mirror array 777 by agmm | 105 comments on Hacker News.

Abcbot — A New Evolving Wormable Botnet Malware Targeting Linux

Researchers from Qihoo 360's Netlab security team have released details of a new evolving botnet called "Abcbot" that has been observed in the wild with worm-like propagation features to infect Linux systems and launch distributed denial-of-service (DDoS) attacks against targets. While the earliest version of the botnet dates back to July 2021, new variants observed as recently as October 30 from The Hacker News https://ift.tt/30s4aKa via IFTTT

Hackers Exploit macOS Zero-Day to Hack Hong Kong Users with new Implant

Google researchers on Thursday disclosed that it found a watering hole attack in late August exploiting a now-parched zero-day in macOS operating system and targeting Hong Kong websites related to a media outlet and a prominent pro-democracy labor and political group to deliver a never-before-seen backdoor on compromised machines. "Based on our findings, we believe this threat actor to be a from The Hacker News https://ift.tt/3oljznx via IFTTT

Rich Harris joins Vercel to work on Svelte full time

Rich Harris joins Vercel to work on Svelte full time 705 by leodriesch | 360 comments on Hacker News.

I'm “still afraid to use spaces in file names” years old

I'm “still afraid to use spaces in file names” years old 707 by dario_satu | 515 comments on Hacker News.

Researchers Uncover Hacker-for-Hire Group That's Active Since 2015

A new cyber mercenary hacker-for-hire group dubbed "Void Balaur" has been linked to a string of cyberespionage and data theft activities targeting thousands of entities as well as human rights activists, politicians, and government officials around the world at least since 2015 for financial gain while lurking in the shadows. Named after a many-headed dragon from Romanian folklore, the adversary from The Hacker News https://ift.tt/3kO9pv1 via IFTTT

TrickBot Operators Partner with Shatak Attackers for Conti Ransomware

The operators of TrickBot trojan are collaborating with the Shathak threat group to distribute their wares, ultimately leading to the deployment of Conti ransomware on infected machines. "The implementation of TrickBot has evolved over the years, with recent versions of TrickBot implementing malware-loading capabilities," Cybereason security analysts Aleksandar Milenkoski and Eli Salem said in a from The Hacker News https://ift.tt/30eZvLQ via IFTTT

Navigating The Threat Landscape 2021 – From Ransomware to Botnets

Though we are recovering from the worst pandemic, cyber threats have shown no sign of downshifting, and cybercriminals are still not short of malicious and advanced ways to achieve their goals.  The Global Threat Landscape Report indicates a drastic rise in sophisticated cyberattacks targeting digital infrastructures, organizations, and individuals in 2021. Threats can take different forms with from The Hacker News https://ift.tt/3wOBTtn via IFTTT

Iran's Lyceum Hackers Target Telecoms, ISPs in Israel, Saudi Arabia, and Africa

A state-sponsored threat actor allegedly affiliated with Iran has been linked to a series of targeted attacks aimed at internet service providers (ISPs) and telecommunication operators in Israel, Morocco, Tunisia, and Saudi Arabia, as well as a ministry of foreign affairs (MFA) in Africa, new findings reveal. The intrusions, staged by a group tracked as Lyceum, are believed to have occurred from The Hacker News https://ift.tt/3okVZYg via IFTTT

Palo Alto Warns of Zero-Day Bug in Firewalls Using GlobalProtect Portal VPN

A new zero-day vulnerability has been disclosed in Palo Alto Networks GlobalProtect VPN that could be abused by an unauthenticated network-based attacker to execute arbitrary code on affected devices with root user privileges. Tracked as CVE-2021-3064 (CVSS score: 9.8), the security weakness impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.17. Massachusetts-based cybersecurity firm Randori from The Hacker News https://ift.tt/3HeuyYA via IFTTT

Making the dislike count private across YouTube

Making the dislike count private across YouTube 694 by minimaxir | 858 comments on Hacker News.

Researchers Discover PhoneSpy Malware Spying on South Korean Citizens

Image
An ongoing mobile spyware campaign has been uncovered snooping on South Korean residents using a family of 23 malicious Android apps to siphon sensitive information and gain remote control of the devices. "With more than a thousand South Korean victims, the malicious group behind this invasive campaign has had access to all the data, communications, and services on their devices," Zimperium from The Hacker News https://ift.tt/30h1OxQ via IFTTT

13 New Flaws in Siemens Nucleus TCP/IP Stack Impact Safety-Critical Equipment

Image
As many as 13 security vulnerabilities have been discovered in the Nucleus TCP/IP stack, a software library now maintained by Siemens and used in three billion operational technology and IoT devices that could allow for remote code execution, denial-of-service (DoS), and information leak. Collectively called "NUCLEUS:13," successful attacks abusing the flaws can "result in devices going offline from The Hacker News https://ift.tt/3qn98Ta via IFTTT

Macron says France will build new nuclear energy reactors

Macron says France will build new nuclear energy reactors 596 by julosflb | 399 comments on Hacker News.

14 New Security Flaws Found in BusyBox Linux Utility for Embedded Devices

Image
Cybersecurity researchers on Tuesday disclosed 14 critical vulnerabilities in the BusyBox Linux utility that could be exploited to result in a denial-of-service (DoS) condition and, in select cases, even lead to information leaks and remote code execution. The security weaknesses, tracked from CVE-2021-42373 through CVE-2021-42386, affect multiple versions of the tool ranging from 1.16-1.33.1, from The Hacker News https://ift.tt/31HCr8F via IFTTT

We saved millions in SSD costs by upgrading our filesystem

We saved millions in SSD costs by upgrading our filesystem 560 by kmdupree | 274 comments on Hacker News.

Show HN: I'm 48 and finally learning how to be a game developer

Show HN: I'm 48 and finally learning how to be a game developer 569 by bananabat | 151 comments on Hacker News.

Microsoft Issues Patches for Actively Exploited Excel, Exchange Server 0-Day Bugs

Image
Microsoft has released security updates as part of its monthly Patch Tuesday release cycle to address 55 vulnerabilities across Windows, Azure, Visual Studio, Windows Hyper-V, and Office, including fixes for two actively exploited zero-day flaws in Excel and Exchange Server that could be abused to take control of an affected system. Of the 55 glitches, six are rated Critical and 49 are rated as from The Hacker News https://ift.tt/3HaMMKw via IFTTT

Lesser-known Postgres features

Lesser-known Postgres features 540 by CRConrad | 134 comments on Hacker News.

ProctorU is dystopian spyware

ProctorU is dystopian spyware 500 by smitop | 307 comments on Hacker News.

.NET 6 Released

.NET 6 Released 466 by tonicbbleking | 390 comments on Hacker News.

Six Palestinian organizations hacked with NSO Group’s Pegasus Spyware

Six Palestinian organizations hacked with NSO Group’s Pegasus Spyware 523 by bjourne | 298 comments on Hacker News.

Unique Challenges to Cyber-Security in Healthcare and How to Address Them

Image
No business is out of danger of cyberattacks today. However, specific industries are particularly at risk and a favorite of attackers. For years, the healthcare industry has taken the brunt of ransomware attacks, data breaches, and other cyberattacks. Why is the healthcare industry particularly at risk for a cyberattack? What are the unique challenges to cybersecurity in healthcare, and how can from The Hacker News https://ift.tt/3H6cZd5 via IFTTT

Robinhood Trading App Suffers Data Breach Exposing 7 Million Users' Information

Image
Robinhood on Monday disclosed a security breach affecting approximately 7 million customers, roughly a third of its user base, that resulted in unauthorized access of personal information by an unidentified threat actor. The commission-free stock trading and investing platform said the incident happened "late in the evening of November 3," adding it's in the process of notifying affected users. from The Hacker News https://ift.tt/3H7irfM via IFTTT

U.S. Charges Ukrainian Hacker for Kaseya Attack; Seizes $6 Million from REvil Gang

Image
The U.S. government on Monday charged a Ukrainian suspect, arrested in Poland last month, with deploying REvil ransomware to target multiple businesses and government entities in the country, including perpetrating the attack against software company Kaseya, marking the latest action to crack down on the cybercrime group and curb further attacks. According to unsealed court documents, from The Hacker News https://ift.tt/3EWwxyJ via IFTTT

Suspected REvil Ransomware Affiliates Arrested in Global Takedown

Image
Romanian law enforcement authorities have announced the arrest of two individuals for their roles as affiliates of the REvil ransomware family, dealing a severe blow to one of the most prolific cybercrime gangs in history. The suspects are believed to have orchestrated more than 5,000 ransomware attacks and extorted close to $600,000 from victims, according to Europol. The arrests, which from The Hacker News https://ift.tt/3BXLlLG via IFTTT

Pinterest ruined photo search on the internet

Pinterest ruined photo search on the internet 518 by spyke112 | 190 comments on Hacker News.

Use forums rather than Slack/Discord to support developer community

Use forums rather than Slack/Discord to support developer community 509 by gk1 | 269 comments on Hacker News.

Don’t do interviews, do discussions

Don’t do interviews, do discussions 492 by maddynator | 377 comments on Hacker News.

Experts Detail Malicious Code Dropped Using ManageEngine ADSelfService Exploit

Image
At least nine entities across the technology, defense, healthcare, energy, and education industries were compromised by leveraging a recently patched critical vulnerability in Zoho's ManageEngine ADSelfService Plus self-service password management and single sign-on (SSO) solution. The spying campaign, which was observed starting September 22, 2021, involved the threat actor taking advantage of from The Hacker News https://ift.tt/3BZL1vY via IFTTT

Aaron Swartz Rememberance Day This Monday

Aaron Swartz Rememberance Day This Monday 539 by mofosyne | 92 comments on Hacker News. For the general public he was seen as just another hacktivist along with various hacktivist groups that were active around the time like lulzsec and anonymous. But for the wider internet community, he represents something much much more, especially post 2020 where we are all questioning many aspect of governance that we take for granted as the normal state of the world. In November the eight of 1986 Aaron Swartz was born. While his early childhood was like any other kid, he showed early spark of someone who would be very consequential to internet culture. One of his first website to be recognized by the public is "The Info Network" a user generated encyclopedia, created at the age of 12 years old which won the ArsDigita Prize. But later on he was accepted into Y Combinator's founder program on a startup called infogami. While infogami failed to get further funding, his contribution ...

BlackBerry Uncovers Initial Access Broker Linked to 3 Distinct Hacker Groups

Image
A previously undocumented initial access broker has been unmasked as providing entry points to three different threat actors for mounting intrusions that range from financially motivated ransomware attacks to phishing campaigns. BlackBerry's research and intelligence team dubbed the entity "Zebra2104," with the group responsible for offering a means of a digital approach to ransomware syndicates from The Hacker News https://ift.tt/3HcStrF via IFTTT

Types of Penetration Testing

Image
If you are thinking about performing a penetration test on your organization, you might be interested in learning about the different types of tests available. With that knowledge, you'll be better equipped to define the scope for your project, hire the right expert and, ultimately, achieve your security objectives. What is penetration testing? Penetration testing, commonly referred to as "pen from The Hacker News https://ift.tt/3mRYpOw via IFTTT

Critical Flaws in Philips TASY EMR Could Expose Patient Data

Image
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of critical vulnerabilities affecting Philips Tasy electronic medical records (EMR) system that could be exploited by remote threat actors to extract sensitive patient data from patient databases. "Successful exploitation of these vulnerabilities could result in patients' confidential data being exposed or extracted from from The Hacker News https://ift.tt/31AkQiR via IFTTT

Two NPM Packages With 22 Million Weekly Downloads Found Backdoored

Image
In what's yet another instance of supply chain attack targeting open-source software repositories, two popular NPM packages with cumulative weekly downloads of nearly 22 million were found to be compromised with malicious code by gaining unauthorized access to the respective developer's accounts. The two libraries in question are "coa," a parser for command-line options, and "rc," a from The Hacker News https://ift.tt/3oa3lNV via IFTTT

Memory leaks are crippling my M1 MacBook Pro

Memory leaks are crippling my M1 MacBook Pro 506 by miles | 461 comments on Hacker News.

A terrible schema from a clueless programmer

A terrible schema from a clueless programmer 467 by zdw | 299 comments on Hacker News.

Timeline of the Human Condition

Timeline of the Human Condition 464 by piotrgrudzien | 110 comments on Hacker News.

Don’t be spooky

Don’t be spooky 481 by mooreds | 205 comments on Hacker News.

What is AT&T doing at 1111340002?

What is AT&T doing at 1111340002? 487 by mperham | 134 comments on Hacker News.

Helion

Helion 460 by sixhobbits | 211 comments on Hacker News.

How credit cards make money

How credit cards make money 469 by grn | 319 comments on Hacker News.

Our self imposed scarcity of nice places

Our self imposed scarcity of nice places 467 by Fricken | 537 comments on Hacker News.

Ask HN: Who's not sucky to work for?

Ask HN: Who's not sucky to work for? 455 by edhowzerblack | 421 comments on Hacker News. I've moved around quite a bit these past several years and I feel like every company has been the same. Management don't know what they want the product to be. Project managers don't know anything about technology. There's an offshore team in Traansylvania busy making it a legacy codebase. They don't want to give developers raises... I see "Who's Hiring?" threads and "Who Wants To Be Hired?" threads. How about a "Who Doesn't Suck To Work For?" thread? Not sure if this will take off or get deleted ...but if it does take off, it would be great if developers --not recruiters-- replied to this. Tell us why your company is a good place to work so we can apply there :-)

Show HN: I built a CNC-machine from scratch, using 40x 3D-printed parts

Show HN: I built a CNC-machine from scratch, using 40x 3D-printed parts 457 by mfi | 136 comments on Hacker News.

Show HN: My wife is pregnant; naturally I made a baby-name app to prepare

Show HN: My wife is pregnant; naturally I made a baby-name app to prepare 584 by hamaluik | 261 comments on Hacker News.

Pfizer's oral Covid-19 antiviral cuts hospitalization, death by 85%

Pfizer's oral Covid-19 antiviral cuts hospitalization, death by 85% 536 by jeremylevy | 662 comments on Hacker News.

Why is Excalidraw so good?

Why is Excalidraw so good? 526 by zekenie | 209 comments on Hacker News.

Ukraine Identifies Russian FSB Officers Hacking As Gamaredon Group

Image
Ukraine's premier law enforcement and counterintelligence agency on Thursday disclosed the real identities of five individuals allegedly involved in cyberattacks attributed to a cyber-espionage group named Gamaredon, linking the members to Russia's Federal Security Service (FSB). Calling the hacker group "an FSB special project, which specifically targeted Ukraine," the Security Service of from The Hacker News https://ift.tt/3q7owTF via IFTTT

U.S. Federal Agencies Ordered to Patch Hundreds of Actively Exploited Flaws

Image
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published a catalog of vulnerabilities, including from Apple, Cisco, Microsoft, and Google, that have known exploits and are being actively exploited by malicious cyber actors, in addition to requiring federal agencies to prioritize applying patches for those security flaws within "aggressive" timeframes. <!--adsense--> "These from The Hacker News https://ift.tt/3wjmpx4 via IFTTT

U.S. Offers $10 Million Reward for Information on DarkSide Ransomware Group

Image
The U.S. government on Thursday announced a $10 million reward for information that may lead to the identification or location of key individuals who hold leadership positions in the DarkSide ransomware group or any of its rebrands. On top of that, the State Department is offering bounties of up to $5 million for intel and tip-offs that could result in the arrest and/or conviction in any country from The Hacker News https://ift.tt/3D03OII via IFTTT

Hardcoded SSH Key in Cisco Policy Suite Lets Remote Hackers Gain Root Access

Image
Cisco Systems has released security updates to address vulnerabilities in multiple Cisco products that could be exploited by an attacker to log in as a root user and take control of vulnerable systems. Tracked as CVE-2021-40119, the vulnerability has been rated 9.8 in severity out of a maximum of 10 on the CVSS scoring system and stems from a weakness in the SSH authentication mechanism of Cisco from The Hacker News https://ift.tt/3ENLB1O via IFTTT

Stockholm parents built their own school app, then the city called the cops

Stockholm parents built their own school app, then the city called the cops 476 by hakonbogen | 308 comments on Hacker News.

HashiCorp – S1

HashiCorp – S1 530 by mootpt | 152 comments on Hacker News.

An oral history of Bank Python

An oral history of Bank Python 503 by todsacerdoti | 181 comments on Hacker News.

People prefer friendliness, trustworthiness in teammates over skill competency

People prefer friendliness, trustworthiness in teammates over skill competency 495 by rustoo | 299 comments on Hacker News.

Critical RCE Vulnerability Reported in Linux Kernel's TIPC Module

Image
Cybersecurity researchers have disclosed a security flaw in the Linux Kernel's Transparent Inter Process Communication (TIPC) module that could potentially be leveraged both locally as well as remotely to execute arbitrary code within the kernel and take control of vulnerable machines. The heap overflow vulnerability "can be exploited locally or remotely within a network to gain kernel from The Hacker News https://ift.tt/3wdTkTM via IFTTT

Our journey to API security at Raiffeisen Bank International

Image
This article was written by Peter Gerdenitsch, Group CISO at Raiffeisen Bank International, and is based on a presentation given during Imvision's Executive Education Program, a series of events focused on how enterprises are taking charge of the API security lifecycle. Launching the "Security in Agile" program Headquartered in Vienna, Raiffeisen Bank International (RBI) operates across 14 from The Hacker News https://ift.tt/3EN8Vwn via IFTTT

US Sanctions Pegasus-maker NSO Group and 3 Others For Selling Spyware

Image
The U.S. Commerce Department on Wednesday added four companies, including Israel-based spyware companies NSO Group and Candiru, to a list of entities engaging in "malicious cyber activities." The agency said the two companies were added to the list based on evidence that "these entities developed and supplied spyware to foreign governments that used these tools to maliciously target government from The Hacker News https://ift.tt/3mH0uMV via IFTTT

Thank you, GitHub

Thank you, GitHub 580 by todsacerdoti | 281 comments on Hacker News.

BlackMatter Ransomware Reportedly Shutting Down; Latest Analysis Released

Image
An analysis of new samples of BlackMatter ransomware for Windows and Linux has revealed the extent to which the operators have continually added new features and encryption capabilities in successive iterations over a three-month period. No fewer than 10 Windows and two Linux versions of the ransomware have been observed in the wild to date, Group-IB threat researcher Andrei Zhdanov said in a from The Hacker News https://ift.tt/3pZPiNG via IFTTT

Product Overview - Cynet Centralized Log Management

Image
For most organizations today, the logs produced by their security tools and environments provide a mixed bag. On the one hand, they can be a trove of valuable data on security breaches, vulnerabilities, attack patterns, and general security insights. On the other, organizations don’t have the right means to manage the massive scale of logs and data produced to derive any value from it.  Log from The Hacker News https://ift.tt/3pXVXrI via IFTTT

The metaverse is already here – it's Minecraft

The metaverse is already here – it's Minecraft 524 by Tomte | 336 comments on Hacker News.

Mekotio Banking Trojan Resurfaces with New Attacking and Stealth Techniques

Image
The operators behind the Mekotio banking trojan have resurfaced with a shift in its infection flow so as to stay under the radar and evade security software, while staging nearly 100 attacks over the last three months. "One of the main characteristics […] is the modular attack which gives the attackers the ability to change only a small part of the whole in order to avoid detection," researchers from The Hacker News https://ift.tt/3q3w5uj via IFTTT

Zillow to stop flipping homes, loses more than $550M, lays off 25% of staff

Zillow to stop flipping homes, loses more than $550M, lays off 25% of staff 500 by swatkat | 357 comments on Hacker News.

Facebook to Shut Down Facial Recognition System and Delete Billions of Records

Image
Facebook's newly-rebranded parent company Meta on Tuesday announced plans to discontinue its decade-old "Face Recognition" system and delete a massive trove of more than a billion users' facial recognition templates as part of a wider initiative to limit the use of the technology across its products. The Menlo Park tech giant described the about-face as "one of the largest shifts in facial from The Hacker News https://ift.tt/3CGnUb9 via IFTTT

Google Warns of New Android 0-Day Vulnerability Under Active Targeted Attacks

Image
Google has rolled out its monthly security patches for Android with fixes for 39 flaws, including a zero-day vulnerability that it said is being actively exploited in the wild in limited, targeted attacks. Tracked as CVE-2021-1048, the zero-day bug is described as a use-after-free vulnerability in the kernel that can be exploited for local privilege escalation. Use-after-free issues are from The Hacker News https://ift.tt/3waCi8Y via IFTTT

Do-nothing scripting: the key to gradual automation

Do-nothing scripting: the key to gradual automation 496 by jabo | 131 comments on Hacker News.

Curves and Surfaces

Curves and Surfaces 480 by todsacerdoti | 35 comments on Hacker News.

Google's infamous internal 2010 “I just want to serve 5TB” video now public

Google's infamous internal 2010 “I just want to serve 5TB” video now public 533 by raldi | 187 comments on Hacker News.

Trump’s new social media platform found using Mastodon code

Trump’s new social media platform found using Mastodon code 483 by nanna | 451 comments on Hacker News.

Ask HN: What you up to? (Who doesn't want to be hired?)

Ask HN: What you up to? (Who doesn't want to be hired?) 489 by capableweb | 637 comments on Hacker News. Instead of talking jobs, what is everyone up to otherwise? Any interesting going on in life or with your hobby project? Unfinished and novel ideas are of course most interesting, so feel free to share anything you're thinking about!

Physics Student Earns PhD at Age 89

Physics Student Earns PhD at Age 89 494 by adharmad | 201 comments on Hacker News.

Alert! Hackers Exploiting GitLab Unauthenticated RCE Flaw in the Wild

Image
A now-patched critical remote code execution (RCE) vulnerability in GitLab's web interface has been detected as actively exploited in the wild, cybersecurity researchers warn, rendering a large number of internet-facing GitLab instances susceptible to attacks. Tracked as CVE-2021-22205, the issue relates to an improper validation of user-provided images that results in arbitrary code execution. from The Hacker News https://ift.tt/3CGhbxH via IFTTT

Google to Pay Hackers $31,337 for Exploiting Patched Linux Kernel Flaws

Image
Google on Monday announced that it will pay security researchers to find exploits using vulnerabilities, previously remediated or otherwise, over the next three months as part of a new bug bounty program to improve the security of the Linux kernel. To that end, the company is expected to issue rewards worth $31,337 for exploiting privilege escalation in a lab environment for each patched from The Hacker News https://ift.tt/2ZDow2t via IFTTT

Report on Stablecoins [pdf]

Report on Stablecoins [pdf] 459 by TheAlchemist | 412 comments on Hacker News.

‘Trojan Source’ Bug Threatens the Security of All Code

‘Trojan Source’ Bug Threatens the Security of All Code 449 by picture | 237 comments on Hacker News.

It's hard to overstate what a scam academic and scientific publishing is

It's hard to overstate what a scam academic and scientific publishing is 478 by jensgk | 252 comments on Hacker News.

CT Scan of a Pumpkin

CT Scan of a Pumpkin 473 by zdw | 77 comments on Hacker News.

Avoiding bot detection: How to scrape the web without getting blocked?

Avoiding bot detection: How to scrape the web without getting blocked? 504 by proszkinasenne2 | 276 comments on Hacker News.

Critical Flaws Uncovered in Pentaho Business Analytics Software

Image
Multiple vulnerabilities have been disclosed in Hitachi Vantara's Pentaho Business Analytics software that could be abused by malicious actors to upload arbitrary data files and even execute arbitrary code on the underlying host system of the application. The security weaknesses were reported by researchers Alberto Favero from German cybersecurity firm Hawsec and Altion Malka from Census Labs from The Hacker News https://ift.tt/3nNfdFB via IFTTT

Securing SaaS Apps — CASB vs. SSPM

Image
There is often confusion between Cloud Access Security Brokers (CASB) and SaaS Security Posture Management (SSPM) solutions, as both are designed to address security issues within SaaS applications. CASBs protect sensitive data by implementing multiple security policy enforcements to safeguard critical data. For identifying and classifying sensitive information, like Personally Identifiable from The Hacker News https://ift.tt/3o4wAC7 via IFTTT

New 'Trojan Source' Technique Lets Hackers Hide Vulnerabilities in Source Code

Image
A novel class of vulnerabilities could be leveraged by threat actors to inject visually deceptive malware in a way that's semantically permissible but alters the logic defined by the source code, effectively opening the door to more first-party and supply chain risks. Dubbed "Trojan Source attacks," the technique "exploits subtleties in text-encoding standards such as Unicode to produce source from The Hacker News https://ift.tt/3ByEOqJ via IFTTT

Researchers Uncover 'Pink' Botnet Malware That Infected Over 1.6 Million Devices

Image
Cybersecurity researchers disclosed details of what they say is the "largest botnet" observed in the wild in the last six years, infecting over 1.6 million devices primarily located in China, with the goal of launching distributed denial-of-service (DDoS) attacks and inserting advertisements into HTTP websites visited by unsuspecting users. Qihoo 360's Netlab security team dubbed the botnet " from The Hacker News https://ift.tt/3BxwnvU via IFTTT