Posts

Showing posts from December, 2021

A single line of code made a 24-core server slower than a laptop

A single line of code made a 24-core server slower than a laptop 478 by Ygg2 | 160 comments on Hacker News.

Linux Kernel RNG is now Blake2 instead of SHA1 and 3x faster

Linux Kernel RNG is now Blake2 instead of SHA1 and 3x faster 494 by tptacek | 138 comments on Hacker News.

FAA investigating controversial crash video

FAA investigating controversial crash video 528 by nostromo | 407 comments on Hacker News.

Emfy: Emacs for You – Quickly set up vanilla Emacs for editing

Emfy: Emacs for You – Quickly set up vanilla Emacs for editing 440 by todsacerdoti | 159 comments on Hacker News.

Facebook said my article was false – now the fact-checkers admit they were wrong

Facebook said my article was false – now the fact-checkers admit they were wrong 480 by nradov | 664 comments on Hacker News.

Tools to Download Netflix / Disney / Apple TV Content

Tools to Download Netflix / Disney / Apple TV Content 562 by janekg | 246 comments on Hacker News.

LastPass users warned their master passwords are compromised

LastPass users warned their master passwords are compromised 543 by markplindsay | 314 comments on Hacker News.

iPhone camera app replaces person’s head with a leaf in photo

iPhone camera app replaces person’s head with a leaf in photo 583 by davidbarker | 356 comments on Hacker News.

The gift of it's your problem now

The gift of it's your problem now 570 by Tomte | 230 comments on Hacker News.

Experimental depression treatment is nearly 80% effective in controlled study

Experimental depression treatment is nearly 80% effective in controlled study 565 by carabiner | 284 comments on Hacker News.

New iLOBleed Rootkit Targeting HP Enterprise Servers with Data Wiping Attacks

A previously unknown rootkit has been found setting its sights on Hewlett-Packard Enterprise's Integrated Lights-Out (iLO) server management technology to carry out in-the-wild attacks that tamper with the firmware modules and completely wipe data off the infected systems. The discovery, which is the first instance of real-world malware in iLO firmware, was documented by Iranian cybersecurity from The Hacker News https://ift.tt/3qAKyN5 via IFTTT

Chinese APT Hackers Used Log4Shell Exploit to Target Academic Institution

A never-before-seen China-based targeted intrusion adversary dubbed Aquatic Panda has been observed leveraging critical flaws in the Apache Log4j logging library as an access vector to perform various post-exploitation operations, including reconnaissance and credential harvesting on targeted systems. Cybersecurity firm CrowdStrike said the infiltration, which was ultimately foiled, was aimed at from The Hacker News https://ift.tt/3JvpIYg via IFTTT

Please don't use Discord for FOSS projects

Please don't use Discord for FOSS projects 584 by Tomte | 449 comments on Hacker News.

Alexa suggests lethal challenge to child

Alexa suggests lethal challenge to child 617 by lwansbrough | 524 comments on Hacker News.

Italian Courts Find Open Source Software Terms Enforceable

Italian Courts Find Open Source Software Terms Enforceable 622 by em-bee | 151 comments on Hacker News.

Ubisoft deleted account with hundreds of dollars’ worth of games for inactivity

Ubisoft deleted account with hundreds of dollars’ worth of games for inactivity 558 by josephcsible | 520 comments on Hacker News.

Ontario bans non-competes and creates right to disconnect from work

Ontario bans non-competes and creates right to disconnect from work 564 by smitop | 171 comments on Hacker News.

Anti-mimetic tactics for living a counter-cultural life

Anti-mimetic tactics for living a counter-cultural life 616 by Ariarule | 263 comments on Hacker News.

You block ads in your browser, why not in your city?

You block ads in your browser, why not in your city? 560 by bearbin | 603 comments on Hacker News.

Ongoing Autom Cryptomining Malware Attacks Using Upgraded Evasion Tactics

An ongoing crypto mining campaign has upgraded its arsenal while adding new defense evasion tactics that enable the threat actors to conceal the intrusions and fly under the radar, new research published today has revealed. Since first detected in 2019, a total of 84 attacks against its honeypot servers have been recorded to date, four of which transpired in 2021, according to researchers from from The Hacker News https://ift.tt/3eyEA9Z via IFTTT

New Apache Log4j Update Released to Patch Newly Discovered Vulnerability

The Apache Software Foundation (ASF) on Tuesday rolled out fresh patches to contain an arbitrary code execution flaw in Log4j that could be abused by threat actors to run malicious code on affected systems, making it the fifth security shortcoming to be discovered in the tool in the span of a month. Tracked as CVE-2021-44832, the vulnerability is rated 6.6 in severity on a scale of 10 and from The Hacker News https://ift.tt/3exUcdQ via IFTTT

“Play-to-Earn” and Bullshit Jobs

“Play-to-Earn” and Bullshit Jobs 695 by paulgb | 454 comments on Hacker News.

Prince of Persia in JavaScript

Prince of Persia in JavaScript 686 by colinprince | 159 comments on Hacker News.

Experts Detail Logging Tool of DanderSpritz Framework Used by Equation Group Hackers

Cybersecurity researchers have offered a detailed glimpse into a system called DoubleFeature that's dedicated to logging the different stages of post-exploitation stemming from the deployment of DanderSpritz, a full-featured malware framework used by the Equation Group. DanderSpritz came to light on April 14, 2017, when a hacking group known as the Shadow Brokers leaked the exploit tool, among from The Hacker News https://ift.tt/3sAqygl via IFTTT

Ask HN: How did my LastPass master password get leaked?

Ask HN: How did my LastPass master password get leaked? 605 by gregsadetsky | 325 comments on Hacker News. Hi, I've just had a bizarre thing happen and wanted to see if the HN community could come up with some theories as to what happened. LastPass blocked a login attempt from Brazil (it wasn't me). According to an email I received from LastPass, this login was using the LastPass account's master password. The email doesn't look like it's a phishing attempt. What troubles me is that the master password was stored in a local encrypted KeePassX file. I can imagine that someone has my KeePassX file and the (completely different) password to this file. If that's the case, I'm in a world of hurt. But are there any other possibilities? Is the email from LastPass accurate i.e. was the login attempt actually using my master password? Is there some LastPass extension installed on some computer still having a valid auth token allowing them to login as me to LastPas...

Garrett Walk-Through Metal Detectors Can Be Hacked Remotely

A number of security flaws have been uncovered in a networking component in Garrett Metal Detectors that could allow remote attackers to bypass authentication requirements, tamper with metal detector configurations, and even execute arbitrary code on the devices. "An attacker could manipulate this module to remotely monitor statistics on the metal detector, such as whether the alarm has been from The Hacker News https://ift.tt/3Jnvye0 via IFTTT

PECB Certified Lead Ethical Hacker: Take Your Career to the Next Level

Cybercrime is increasing exponentially and presents devastating risks for most organizations. According to Cybercrime Magazine, global cybercrime damage is predicted to hit $10.5 trillion annually as of 2025. One of the more recent and increasingly popular forms of tackling such issues by identifying is ethical hacking. This method identifies potential security vulnerabilities in its early from The Hacker News https://ift.tt/3JpehBs via IFTTT

'Spider-Man: No Way Home' Pirated Downloads Contain Crypto-Mining Malware

Peter Parker might not be a mastermind cryptocurrency criminal, but the name Spiderman is quickly becoming more associated with the mining landscape. ReasonLabs, a leading provider of cybersecurity prevention and detection software, recently discovered a new form of malware hacking into customer computers in the guise of the latest Spiderman movie.  As perhaps the most talked-about movie for from The Hacker News https://ift.tt/3epp4gw via IFTTT

New Android Malware Targeting Brazil's Itaú Unibanco Bank Customers

Researchers have discovered a new Android banking malware that targets Brazil’s Itaú Unibanco with the help of lookalike Google Play Store pages to carry out fraudulent financial transactions on victim devices without their knowledge. “This application has a similar icon and name that could trick users into thinking it is a legitimate app related to Itaú Unibanco,” Cyble researchers said in a from The Hacker News https://ift.tt/3Er8s2p via IFTTT

New Android Malware Targeting Brazil's Itaú Unibanco Bank Customers

Researchers have discovered a new Android banking malware that targets Brazil’s Itaú Unibanco with the help of lookalike Google Play Store pages to carry out fraudulent financial transactions on victim devices without their knowledge. “This application has a similar icon and name that could trick users into thinking it is a legitimate app related to Itaú Unibanco,” Cyble researchers said in a from The Hacker News https://ift.tt/32nnPMC via IFTTT

A New Coefficient of Correlation

A New Coefficient of Correlation 563 by malshe | 142 comments on Hacker News.

All the giant companies used ffmpeg (2020)

All the giant companies used ffmpeg (2020) 545 by tosh | 180 comments on Hacker News.

25-Dec. Shout-out to everyone else at work

25-Dec. Shout-out to everyone else at work 592 by sandworm101 | 127 comments on Hacker News. I made a similar post last year at this time and, again, I am in my office on Christmas morning. There are a few days every year that really show which jobs are vital and which can be left aside for a day. I started my car this morning (-32, -40 with wind chill). On my way to work I drove past a hospital and a care home, both were manned. The dairy farm had its lights on. A cop with his flashers drove past me on the way to some emergency. The macdonalds drive-through was open too. I had to be at work by 0600, but I was relieving someone who had been sitting in another office since 1800. On my computer were the same dozen emails I get every morning, each from someone else who drew the short straw. There aren't many of us on HN that work weekends let alone Christmas morning, but If you too are sitting in a dark office remember that all across the world are millions of other people working ...

Tell HN: Microsoft forks MIT licensed repo, and changes the copyright to them

Tell HN: Microsoft forks MIT licensed repo, and changes the copyright to them 652 by mkdirp | 244 comments on Hacker News.

Tell HN: You are not alone this Christmas

Tell HN: You are not alone this Christmas 533 by mattowen_uk | 154 comments on Hacker News. Hi, my Christmas is solitary this year, no family or friends. I'm not even having a Christmas dinner. I'm not sad about this, though. It's just the way it is. What I wanted to say is, if you are in the same situation, you are not alone. So have a virtual hug from me.

Running your own email is increasingly an artisanal choice, not a practical one

Running your own email is increasingly an artisanal choice, not a practical one 505 by throw0101a | 404 comments on Hacker News.

Street Fighter II paper trails – allocating sprite space by hand

Street Fighter II paper trails – allocating sprite space by hand 529 by krajzeg | 74 comments on Hacker News.

Buying Influence: How China manipulates Facebook and Twitter

Buying Influence: How China manipulates Facebook and Twitter 507 by bale | 389 comments on Hacker News.

Ask HN: Those making $500/month on side projects in 2021 – Show and tell

Ask HN: Those making $500/month on side projects in 2021 – Show and tell 574 by folli | 610 comments on Hacker News. It seems this question hasn't been asked for some time, so I'd be interested hear what new (and old) ideas have come up.

Expert Details macOS Bug That Could Let Malware Bypass Gatekeeper Security

Apple recently fixed a security vulnerability in the macOS operating system that could be potentially exploited by a threat actor to "trivially and reliably" bypass a "myriad of foundational macOS security mechanisms" and run arbitrary code. Security researcher Patrick Wardle detailed the discovery in a series of tweets on Thursday. Tracked as CVE-2021-30853 (CVSS score: 5.5), the issue relates from The Hacker News https://ift.tt/3Jih6Eg via IFTTT

New Ransomware Variants Flourish Amid Law Enforcement Actions

Ransomware groups continue to evolve their tactics and techniques to deploy file-encrypting malware on compromised systems, notwithstanding law enforcement's disruptive actions against the cybercrime gangs to prevent them from victimizing additional companies. "Be it due to law enforcement, infighting amongst groups or people abandoning variants altogether, the RaaS [ransomware-as-a-service] from The Hacker News https://ift.tt/3ErswSv via IFTTT

New BLISTER Malware Using Code Signing Certificates to Evade Detection

Cybersecurity researchers have disclosed details of an evasive malware campaign that makes use of valid code signing certificates to sneak past security defenses and stay under the radar with the goal of deploying Cobalt Strike and BitRAT payloads on compromised systems. The binary, a loader, has been dubbed "Blister" by researchers from Elastic Security, with the malware samples having  from The Hacker News https://ift.tt/3ErRaSK via IFTTT

CISA, FBI and NSA Publish Joint Advisory and Scanner for Log4j Vulnerabilities

Cybersecurity agencies from Australia, Canada, New Zealand, the U.S., and the U.K. on Wednesday released a joint advisory in response to widespread exploitation of multiple vulnerabilities in Apache's Log4j software library by nefarious adversaries. "These vulnerabilities, especially Log4Shell, are severe," the intelligence agencies said in the new guidance. "Sophisticated cyber threat actors from The Hacker News https://ift.tt/3yRdxzS via IFTTT

IoT SAFE — An Innovative Way to Secure IoT

By the end of 2021, there will be 12 billion connected IoT devices, and by 2025, that number will rise to 27 billion. All these devices will be connected to the internet and will send useful data that will make industries, medicine, and cars more intelligent and more efficient. However, will all these devices be safe? It's worth asking what you can do to prevent (or at least reduce) becoming a from The Hacker News https://ift.tt/3pm0Z0o via IFTTT

How to draw S-curved arrows between boxes

How to draw S-curved arrows between boxes 543 by alex_stoddard | 48 comments on Hacker News.

4-Year-Old Bug in Azure App Service Exposed Hundreds of Source Code Repositories

A security flaw has been unearthed in Microsoft's Azure App Service that resulted in the exposure of source code of customer applications written in Java, Node, PHP, Python, and Ruby for at least four years since September 2017. The vulnerability, codenamed "NotLegit," was reported to the tech giant by Wiz researchers on October 7, 2021, following which mitigations have been undertaken to fix from The Hacker News https://ift.tt/3sse5uZ via IFTTT

Regulators Shut Down Lending Platform (YC Alum) LendUp

Regulators Shut Down Lending Platform (YC Alum) LendUp 532 by boeingUH60 | 460 comments on Hacker News.

Researchers Disclose Unpatched Vulnerabilities in Microsoft Teams Software

Microsoft said it won't be fixing or is pushing patches to a later date for three of the four security flaws uncovered in its Teams business communication platform earlier this March. The disclosure comes from Berlin-based cybersecurity firm Positive Security, which found that the implementation of the link preview feature was susceptible to a number of issues that could "allow accessing from The Hacker News https://ift.tt/30Vjfo0 via IFTTT

AWS appears to be down again

AWS appears to be down again 523 by riknox | 372 comments on Hacker News. Console is flickering between "website is unavailable" and being up for my team. This is happening very frequently just now, reliability seems to have taken a hit.

China suspends deal with Alibaba for not sharing Log4j 0-day first with the government

China's internet regulator, the Ministry of Industry and Information Technology (MIIT), has suspended a partnership with Alibaba Cloud, the cloud computing subsidiary of e-commerce giant Alibaba Group, for six months for failing to promptly report a critical security vulnerability affecting the broadly used Log4j logging library. The development was reported by Reuters and South China Morning from The Hacker News https://ift.tt/32wKgyE via IFTTT

Hidden Networks in TP-Link Routers

Hidden Networks in TP-Link Routers 543 by ignitionmonkey | 192 comments on Hacker News.

New Exploit Lets Malware Attackers Bypass Patch for Critical Microsoft MSHTML Flaw

A short-lived phishing campaign has been observed taking advantage of a novel exploit that bypassed a patch put in place by Microsoft to fix a remote code execution vulnerability affecting the MSHTML component with the goal of delivering Formbook malware. "The attachments represent an escalation of the attacker's abuse of the CVE-2021-40444 bug and demonstrate that even a patch can't always from The Hacker News https://ift.tt/3pjhnik via IFTTT

Active Directory Bugs Could Let hackers Take Over Windows Domain Controllers

Microsoft is urging customers to patch two security vulnerabilities in Active Directory domain controllers that it addressed in November following the availability of a proof-of-concept (PoC) tool on December 12. The two vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — have a severity rating of 7.5 out of a maximum of 10 and concern a privilege escalation flaw affecting the from The Hacker News https://ift.tt/32rVYu1 via IFTTT

Meta Sues Hackers Behind Facebook, WhatsApp and Instagram Phishing Attacks

Facebook's parent company Meta Platforms on Monday said it has filed a federal lawsuit in the U.S. state of California against bad actors who operated more than 39,000 phishing websites that impersonated its digital properties to mislead unsuspecting users into divulging their login credentials. The social engineering scheme involved the creation of rogue webpages that masqueraded as the login from The Hacker News https://ift.tt/3pf6q11 via IFTTT

Against 3x Speed

Against 3x Speed 485 by Ariarule | 328 comments on Hacker News.

The Big DevOps Misunderstanding

The Big DevOps Misunderstanding 503 by WolfOliver | 303 comments on Hacker News.

An iframe from googlesyndication.com tries to access the camera and microphone

An iframe from googlesyndication.com tries to access the camera and microphone 541 by authed | 269 comments on Hacker News.

Test your product on a crappy laptop

Test your product on a crappy laptop 515 by dredmorbius | 302 comments on Hacker News.

CCPA Scam – Human subject research study conducted by Princeton University

CCPA Scam – Human subject research study conducted by Princeton University 476 by ColinWright | 328 comments on Hacker News.

Stealth bomber in flight on Google Maps

Stealth bomber in flight on Google Maps 966 by edge17 | 207 comments on Hacker News.

How to see if cybersecurity of your organization is in check for the New Year

The last several years have seen an ever-increasing number of cyber-attacks, and while the frequency of such attacks has increased, so too has the resulting damage. One needs only to look at CISA's list of significant cyber incidents to appreciate the magnitude of the problem. In May of 2021, for example, a ransomware attack brought down the Colonial Pipeline, causing a serious fuel disruption from The Hacker News https://ift.tt/3Ec0ASw via IFTTT

Experts Discover Backdoor Deployed on the U.S. Federal Agency's Network

A U.S. federal government commission associated with international rights has been targeted by a backdoor that reportedly compromised its internal network in what the researchers described as a "classic APT-type operation."  "This attack could have given total visibility of the network and complete control of a system and thus could be used as the first step in a multi-stage attack to penetrate from The Hacker News https://ift.tt/3EcxGBE via IFTTT

Bottles: GUI front end to run Windows software on Linux

Bottles: GUI front end to run Windows software on Linux 559 by 1_player | 179 comments on Hacker News.

Over 500,000 Android Users Downloaded a New Joker Malware App from Play Store

A malicious Android app with more than 500,000 downloads from the Google Play app store has been found hosting malware that stealthily exfiltrates users' contact lists to an attacker-controlled server and signs up users to unwanted paid premium subscriptions without their knowledge. The latest Joker malware was found in a messaging-focused app named Color Message ("com.guo.smscolor.amessage"), from The Hacker News https://ift.tt/3p9nqWA via IFTTT

Lithuania evacuates its embassy in China

Lithuania evacuates its embassy in China 536 by baylearn | 571 comments on Hacker News.

Apple Helps Asahi Linux

Apple Helps Asahi Linux 536 by CraigJPerry | 172 comments on Hacker News.

Worker pay isn’t keeping up with inflation

Worker pay isn’t keeping up with inflation 607 by paulpauper | 804 comments on Hacker News.

Internet addiction and the habit of book reading

Internet addiction and the habit of book reading 606 by shankarro | 327 comments on Hacker News.

Tokio Console

Tokio Console 711 by hasheddan | 101 comments on Hacker News.

New Local Attack Vector Expands the Attack Surface of Log4j Vulnerability

Cybersecurity researchers have discovered an entirely new attack vector that enables adversaries to exploit the Log4Shell vulnerability on servers locally by using a JavaScript WebSocket connection. "This newly-discovered attack vector means that anyone with a vulnerable Log4j version on their machine or local private network can browse a website and potentially trigger the vulnerability," from The Hacker News https://ift.tt/33zvbMZ via IFTTT

Apache Issues 3rd Patch to Fix New High-Severity Log4j Vulnerability

The issues with Log4j continued to stack up as the Apache Software Foundation (ASF) on Friday rolled out yet another patch — version 2.17.0 — for the widely used logging library that could be exploited by malicious actors to stage a denial-of-service (DoS) attack. Tracked as CVE-2021-45105 (CVSS score: 7.5), the new vulnerability affects all versions of the tool from 2.0-beta9 to 2.16.0, which from The Hacker News https://ift.tt/3e1N355 via IFTTT

TikTok streaming software is an illegal fork of OBS

TikTok streaming software is an illegal fork of OBS 651 by cwaffles | 203 comments on Hacker News.

Tqdm (Python)

Tqdm (Python) 682 by manjana | 150 comments on Hacker News.

Pelosi defends stock trading by lawmakers. ‘We are a free-market economy’

Pelosi defends stock trading by lawmakers. ‘We are a free-market economy’ 581 by tiahura | 491 comments on Hacker News.

Facebook Bans 7 'Cyber Mercenary' Companies for Spying on 50,000 Users

Meta Platforms on Thursday revealed it took steps to deplatform seven cyber mercenaries that it said carried out "indiscriminate" targeting of journalists, dissidents, critics of authoritarian regimes, families of opposition, and human rights activists located in over 100 countries, amid mounting scrutiny of surveillance technologies. To that end, the company said it alerted 50,000 users of from The Hacker News https://ift.tt/3p6awbY via IFTTT

New PseudoManuscrypt Malware Infected Over 35,000 Computers in 2021

Industrial and government organizations, including enterprises in the military-industrial complex and research laboratories, are the targets of a new malware botnet dubbed PseudoManyscrypt that has infected roughly 35,000 Windows computers this year alone. The name comes from its similarities to the Manuscrypt malware, which is part of the Lazarus APT group's attack toolset, Kaspersky from The Hacker News https://ift.tt/3GUAuVA via IFTTT

How to Prevent Customer Support Help Desk Fraud Using VPN and Other Tools

It's no secret that the internet isn't a very safe place. And it's not hard to understand why. It's a medium that connects billions of people around the world that affords bad actors enough anonymity to wreak havoc without getting caught. It's almost as if the internet's tailor-made to enable scams and fraud. And that's just what it does. Right now, the world's on track to lose $10.5 trillion from The Hacker News https://ift.tt/3sfaUXC via IFTTT

New Phorpiex Botnet Variant Steals Half a Million Dollars in Cryptocurrency

Cryptocurrency users in Ethiopia, Nigeria, India, Guatemala, and the Philippines are being targeted by a new variant of the Phorpiex botnet called Twizt that has resulted in the theft of virtual coins amounting to $500,000 over the last one year. Israeli security firm Check Point Research, which detailed the attacks, said the latest evolutionary version "enables the botnet to operate from The Hacker News https://ift.tt/3GQwIfZ via IFTTT

Windows 11 Officially Shuts Down Firefox’s Default Browser Workaround

Windows 11 Officially Shuts Down Firefox’s Default Browser Workaround 618 by beezle | 464 comments on Hacker News.

Ask HN: Are most of us developers lying about how much work we do?

Ask HN: Are most of us developers lying about how much work we do? 740 by ConfessionTime | 496 comments on Hacker News. I have been working as a software developer for almost two decades. I have received multiple promotions. I make decent money, 3x - 4x my area's median salary, so I live a comfortable life. I have never been fired or unemployed for more than a few months total over my entire career. Through most of that time I have averaged roughly 5 - 10 hours of actual work a week. I'm not even discounting job related but non-coding time as not work. There are literally days in which the only time I spend on my job is the few minutes it takes to attend the morning stand-up. Then I successfully bullshit my way through our next stand-up to hide my lack of production. No one has ever called me out on this and my performance reviews range from mediocre to great. I'm generally a smart person. I went to a top 30 university, but it's not like I'm a genius or I'm c...

From Node to Ruby on Rails

From Node to Ruby on Rails 596 by mokkol | 407 comments on Hacker News.

Don't start with microservices – monoliths are your friend

Don't start with microservices – monoliths are your friend 637 by galovics | 254 comments on Hacker News.

Researchers Uncover New Coexistence Attacks On Wi-Fi and Bluetooth Chips

Cybersecurity researchers have demonstrated a new attack technique that makes it possible to leverage a device's Bluetooth component to directly extract network passwords and manipulate traffic on a Wi-Fi chip. The novel attacks work against the so-called "combo chips," which are specialized chips that are equipped to handle different types of radio wave-based wireless communications, such as from The Hacker News https://ift.tt/3IWCWgo via IFTTT

The Guide to Automating Security Training for Lean Security Teams

Cyber threats used to be less threatening. While nobody wants their customers' credit card numbers stolen in a data breach, or to see a deranged manifesto plastered over their company website, such incidents can almost seem quaint compared to ransomware attacks that bring all of your critical information systems to a dead halt. The frequency of these attacks increased more than 150% in the U.S. from The Hacker News https://ift.tt/3q4jghJ via IFTTT

New Fileless Malware Uses Windows Registry as Storage to Evade Detection

A new JavaScript-based remote access Trojan (RAT) propagated via a social engineering campaign has been observed employing sneaky "fileless" techniques as part of its detection-evasion methods to elude discovery and analysis. Dubbed DarkWatchman by researchers from Prevailion's Adversarial Counterintelligence Team (PACT), the malware uses a resilient domain generation algorithm (DGA) to identify from The Hacker News https://ift.tt/3oZjesj via IFTTT

Hackers Begin Exploiting Second Log4j Vulnerability as a Third Flaw Emerges

Web infrastructure company Cloudflare on Wednesday revealed that threat actors are actively attempting to exploit a second bug disclosed in the widely used Log4j logging utility, making it imperative that customers move quickly to install the latest version as a barrage of attacks continues to pummel unpatched systems with a variety of malware. "This vulnerability is actively being exploited and from The Hacker News https://ift.tt/3s7hE9F via IFTTT

A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution

A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution 583 by arkadiyt | 230 comments on Hacker News.

Facebook to Pay Hackers for Reporting Data Scraping Bugs and Scraped Datasets

Meta Platforms, the company formerly known as Facebook, has announced that it's expanding its bug bounty program to start rewarding valid reports of scraping vulnerabilities across its platforms as well as include reports of scraping data sets that are available online. "We know that automated activity designed to scrape people's public and private data targets every website or service," said from The Hacker News https://ift.tt/3m7uSzx via IFTTT

Cynet's MDR Offers Organizations Continuous Security Oversight

Today's cyber attackers are constantly looking for ways to exploit vulnerabilities and infiltrate organizations. To keep up with this evolving threat landscape, security teams must be on the lookout for potential risks around the clock. Since most organizations simply cannot afford to have 24x7 security teams, managed detection and response (MDR) services have become a critical aspect of any from The Hacker News https://ift.tt/30tT1J3 via IFTTT

Hackers Using Malicious IIS Server Module to Steal Microsoft Exchange Credentials

Malicious actors are deploying a previously undiscovered binary, an Internet Information Services (IIS) webserver module dubbed "Owowa," on Microsoft Exchange Outlook Web Access servers with the goal of stealing credentials and enabling remote command execution. "Owowa is a C#-developed .NET v4.0 assembly that is intended to be loaded as a module within an IIS web server that also exposes from The Hacker News https://ift.tt/3IL7uSd via IFTTT

Microsoft Issues Windows Update to Patch 0-Day Used to Spread Emotet Malware

Microsoft has rolled out Patch Tuesday updates to address multiple security vulnerabilities in Windows and other software, including one actively exploited flaw that's being abused to deliver Emotet, TrickBot, or Bazaloader malware payloads. The latest monthly release for December fixes a total of 67 flaws, bringing the total number of bugs patched by the company this year to 887, according to from The Hacker News https://ift.tt/3DVUQw6 via IFTTT

Plans you're not supposed to talk about

Plans you're not supposed to talk about 553 by dynm | 419 comments on Hacker News.

Go Replaces Interface{} with 'Any'

Go Replaces Interface{} with 'Any' 567 by brosciencecode | 299 comments on Hacker News.

Second Log4j Vulnerability (CVE-2021-45046) Discovered — New Patch Released

The Apache Software Foundation (ASF) has pushed out a new fix for the Log4j logging utility after the previous patch for the recently disclosed Log4Shell exploit was deemed as "incomplete in certain non-default configurations." The second vulnerability — tracked as CVE-2021-45046 — is rated 3.7 out of a maximum of 10 on the CVSS rating system and affects all versions of Log4j from 2.0-beta9 from The Hacker News https://ift.tt/3IT5WFC via IFTTT

Latest Apple iOS Update Patches Remote Jailbreak Exploit for iPhones

Apple on Monday released updates to iOS, macOS, tvOS, and watchOS with security patches for multiple vulnerabilities, including a remote jailbreak exploit chain as well as a number of critical issues in the Kernel and Safari web browser that were first demonstrated at the Tianfu Cup held in China two months ago. Tracked as CVE-2021-30955, the issue could have enabled a malicious application to from The Hacker News https://ift.tt/3226kAU via IFTTT

Update Google Chrome to Patch New Zero-Day Exploit Detected in the Wild

Google has rolled out fixes for five security vulnerabilities in its Chrome web browser, including one which it says is being exploited in the wild, making it the 17th such weakness to be disclosed since the start of the year. Tracked as CVE-2021-4102, the flaw relates to a use-after-free bug in the V8 JavaScript and WebAssembly engine, which could have severe consequences ranging from from The Hacker News https://ift.tt/3DTSuOf via IFTTT

Ask HN: Best Way to Contact YouTube

Ask HN: Best Way to Contact YouTube 469 by S_A_P | 136 comments on Hacker News. I woke up this morning to an email from YouTube stating that my channel is banned for repeated violations. They didn’t specify what I violated but it could be anything from copyright to hate speech. Let me explain the content of all 5 videos on my 11 year + old channel. 1) a video of a squirrel that carried half a loaf of French bread along a fence and jumped into a tree. He dropped the bread during the jump but somehow managed to one hand/paw catch the bread and save it. 2) a friend of mine who was unable to ride a spring horse on a playground. 3)my son reacting to a scene from the movie hot rod(cool beans) this was a private video. 4) music video of my own music. No samples or other copyrighted material contained. 5) another music video also with no copyrighted material. I submitted a request to the YouTube forum but I suspect that is a black hole where support requests go to die. I’m not really all th...

Toyota owners have to pay $8/mo to keep using their key fob for remote start

Toyota owners have to pay $8/mo to keep using their key fob for remote start 504 by slobotron | 434 comments on Hacker News.

The Matrix Is Unreal

The Matrix Is Unreal 469 by vblanco | 224 comments on Hacker News.

Putty maintainer on his attitude towards security and open source

Putty maintainer on his attitude towards security and open source 517 by AndrewDucker | 129 comments on Hacker News.

Japanese scientists develop vaccine to eliminate cells behind aging

Japanese scientists develop vaccine to eliminate cells behind aging 461 by olalonde | 345 comments on Hacker News.

Log4j: Between a rock and a hard place

Log4j: Between a rock and a hard place 534 by todsacerdoti | 385 comments on Hacker News.

Karakurt: A New Emerging Data Theft and Cyber Extortion Hacking Group

A previously undocumented, financially motivated threat group has been connected to a string of data theft and extortion attacks on over 40 entities between September and November 2021. The hacker collective, which goes by the self-proclaimed name Karakurt and was first identified in June 2021, is capable of modifying its tactics and techniques to adapt to the targeted environment, Accenture's from The Hacker News https://ift.tt/3yod0oN via IFTTT

Top 3 SaaS Security Threats for 2022

With 2021 drawing to a close and many closing their plans and budgets for 2022, the time has come to do a brief wrap-up of the SaaS Security challenges on the horizon. Here are the top 3 SaaS security posture challenges as we see them.  1 — The Mess of Misconfiguration Management The good news is that more businesses than ever are using SaaS apps such as GitHub, Microsoft 365, Salesforce, Slack, from The Hacker News https://ift.tt/3DQAYKz via IFTTT

Microsoft Details Building Blocks of Widely Active Qakbot Banking Trojan

Infection chains associated with the multi-purpose Qakbot malware have been broken down into "distinct building blocks," an effort that Microsoft said will help to detect and block the threat in an effective manner proactively. The Microsoft 365 Defender Threat Intelligence Team dubbed Qakbot a "customizable chameleon that adapts to suit the needs of the multiple threat actor groups that utilize from The Hacker News https://ift.tt/3oR6NyR via IFTTT

Apache Log4j Vulnerability — Log4Shell — Widely Under Active Attack

Threat actors are actively weaponizing unpatched servers affected by the newly disclosed "Log4Shell" vulnerability in Log4j to install cryptocurrency miners, Cobalt Strike, and recruit the devices into a botnet, even as telemetry signs point to exploitation of the flaw nine days before it even came to light. Netlab, the networking security division of Chinese tech giant Qihoo 360, disclosed  from The Hacker News https://ift.tt/3DNrgZC via IFTTT

This website has 81% battery power remaining

This website has 81% battery power remaining 598 by behnamoh | 166 comments on Hacker News.

Professional maintainers: a wake-up call

Professional maintainers: a wake-up call 485 by FiloSottile | 370 comments on Hacker News.

PSA: uBlock/AdBlocks on Chrome to lose function thanks to Manifestv3

PSA: uBlock/AdBlocks on Chrome to lose function thanks to Manifestv3 492 by diplodocusaur | 288 comments on Hacker News.

Dracula Theme – A dark theme for many different apps

Dracula Theme – A dark theme for many different apps 482 by vmbrasseur | 221 comments on Hacker News.

Summary of the AWS Service Event in the Northern Virginia (US-East-1) Region

Summary of the AWS Service Event in the Northern Virginia (US-East-1) Region 521 by eigen-vector | 306 comments on Hacker News.

Sleep technique used by Salvador Dalí works

Sleep technique used by Salvador Dalí works 501 by ohiovr | 188 comments on Hacker News.

Turning a MacBook into a touchscreen with $1 of hardware (2018)

Turning a MacBook into a touchscreen with $1 of hardware (2018) 478 by hidden-spyder | 85 comments on Hacker News.

Julian Assange can be extradited to the US, court rules

Julian Assange can be extradited to the US, court rules 579 by goodcanadian | 579 comments on Hacker News.

Groups never admit failure

Groups never admit failure 475 by todsacerdoti | 341 comments on Hacker News.

BlackCat: A New Rust-based Ransomware Malware Spotted in the Wild

Details have emerged about what's the first Rust-language-based ransomware strain spotted in the wild that has already amassed "some victims from different countries" since its launch last month. The ransomware, dubbed BlackCat, was disclosed by MalwareHunterTeam. "Victims can pay with Bitcoin or Monero," the researchers said in a series of tweets detailing the file-encrypting malware. "Also from The Hacker News https://ift.tt/3ycgdI0 via IFTTT

1.6 Million WordPress Sites Under Cyberattack From Over 16,000 IP Addresses

As many as 1.6 million WordPress sites have been targeted by an active large-scale attack campaign originating from 16,000 IP addresses by exploiting weaknesses in four plugins and 15 Epsilon Framework themes. WordPress security company Wordfence, which disclosed details of the attacks, said Thursday it had detected and blocked more than 13.7 million attacks aimed at the plugins and themes in a from The Hacker News https://ift.tt/3oIg8c5 via IFTTT

Russia Blocks Tor Privacy Service in Latest Censorship Move

Russia has stepped up its censorship efforts in the country by fully banning access to the Tor web anonymity service, coinciding with the ban of six virtual private network (VPN) operators, as the government continues to control the internet and crackdown on attempts to circumvent locally imposed web restrictions. The Federal Service for Supervision of Communications, Information Technology and from The Hacker News https://ift.tt/3EMiix4 via IFTTT

Log4j RCE Found

Log4j RCE Found 564 by usmannk | 184 comments on Hacker News.

Chrome users beware: Manifest v3 is deceitful and threatening

Chrome users beware: Manifest v3 is deceitful and threatening 496 by dredmorbius | 249 comments on Hacker News.

Tailwind CSS v3.0

Tailwind CSS v3.0 485 by pspeter3 | 248 comments on Hacker News.

Improving GitHub Code Search

Improving GitHub Code Search 461 by todsacerdoti | 181 comments on Hacker News.

Why Holidays Put Your Company at Risk of Cyber Attack (And How to Take Precautions)

It is a time when many are thinking of their families and loved ones, time off work, and gift-giving – the holidays. However, while many have their minds outside the realm of work during the holiday season, often, this is when attackers plan their most sinister attacks.  So how can you take precautions to protect your organization during these times? Why holidays put your company at risk of from The Hacker News https://ift.tt/3081rp8 via IFTTT

Over 300,000 MikroTik Devices Found Vulnerable to Remote Hacking Bugs

At least 300,000 IP addresses associated with MikroTik devices have been found vulnerable to multiple remotely exploitable security vulnerabilities that have since been patched by the popular supplier of routers and wireless ISP devices. The most affected devices are located in China, Brazil, Russia, Italy, Indonesia, with the U.S. coming in at number eight, cybersecurity firm Eclypsium said in from The Hacker News https://ift.tt/3EFPypA via IFTTT

Over a Dozen Malicious NPM Packages Caught Hijacking Discord Servers

At least 17 malware-laced packages have been discovered on the NPM package Registry, adding to a recent barrage of malicious software hosted and delivered through open-source software repositories such as PyPi and RubyGems. DevOps firm JFrog said the libraries, now taken down, were designed to grab Discord access tokens and environment variables from users' computers as well as gain full control from The Hacker News https://ift.tt/3lReG5h via IFTTT

SonicWall Urges Customers to Immediately Patch Critical SMA 100 Flaws

Network security vendor SonicWall is urging customers to update their SMA 100 series appliances to the latest version following the discovery of multiple security vulnerabilities that could be abused by a remote attacker to take complete control of an affected system. The flaws impact SMA 200, 210, 400, 410, and 500v products running versions 9.0.0.11-31sv and earlier, 10.2.0.8-37sv, from The Hacker News https://ift.tt/3y7veuT via IFTTT

How a Kalman filter works, in pictures

How a Kalman filter works, in pictures 457 by jack_riminton | 78 comments on Hacker News.

Django 4.0

Django 4.0 455 by Spiritus | 208 comments on Hacker News.

Apple CEO Tim Cook 'secretly' signed $275B deal with China in 2016

Apple CEO Tim Cook 'secretly' signed $275B deal with China in 2016 536 by baybal2 | 316 comments on Hacker News.

Google Disrupts Blockchain-based Glupteba Botnet; Sues Russian Hackers

Google on Tuesday said it took steps to disrupt the operations of a sophisticated "multi-component" botnet called Glupteba that approximately infected more than one million Windows computers across the globe and stored its command-and-control server addresses on Bitcoin's blockchain as a resilience mechanism. As part of the efforts, Google's Threat Analysis Group (TAG) said it partnered with the from The Hacker News https://ift.tt/3Dxk0AN via IFTTT

140,000 Reasons Why Emotet is Piggybacking on TrickBot in its Return from the Dead

The operators of TrickBot malware have infected an estimated 140,000 victims across 149 countries a little over a year after attempts were to dismantle its infrastructure, even as the malware is fast becoming an entry point for Emotet, another botnet that was taken down at the start of 2021. Most of the victims detected since November 1, 2020, are from Portugal (18%), the U.S. (14%), and India ( from The Hacker News https://ift.tt/3y5viem via IFTTT

[eBook] Guide to Achieving 24x7 Threat Monitoring and Response for Lean IT Security Teams

If there is one thing the past few years have taught the world, it’s that cybercrime never sleeps. For organizations of any size and scope, having around-the-clock protection for their endpoints, networks, and servers is no longer optional, but it’s also not entirely feasible for many. Attackers are better than ever at slipping in undetected, and threats are constantly evolving.  Teams can’t from The Hacker News https://ift.tt/3lKkSfr via IFTTT

Warning: Yet Another Bitcoin Mining Malware Targeting QNAP NAS Devices

Network-attached storage (NAS) appliance maker QNAP on Tuesday released a new advisory warning of a cryptocurrency mining malware targeting its devices, urging customers to take preventive steps with immediate effect. "A bitcoin miner has been reported to target QNAP NAS. Once a NAS is infected, CPU usage becomes unusually high where a process named '[oom_reaper]' could occupy around 50% of the from The Hacker News https://ift.tt/3Dy1msI via IFTTT

AWS us-east-1 outage

AWS us-east-1 outage 513 by judge2020 | 253 comments on Hacker News.

Debunking Cloudflare’s recent performance tests

Debunking Cloudflare’s recent performance tests 507 by mcone | 264 comments on Hacker News.

Eltima SDK Contain Multiple Vulnerabilities Affecting Several Cloud Service Provides

Cybersecurity researchers have disclosed multiple vulnerabilities in a third-party driver software developed by Eltima that have been "unwittingly inherited" by cloud desktop solutions like Amazon Workspaces, Accops, and NoMachine and could provide attackers a path to perform an array of malicious activities. "These vulnerabilities allow attackers to escalate privileges enabling them to disable from The Hacker News https://ift.tt/3pFUFQu via IFTTT

SolarWinds Hackers Targeting Government and Business Entities Worldwide

Nobelium, the threat actor attributed to the massive SolarWinds supply chain compromise, has been once again linked to a series of attacks targeting multiple cloud solution providers, services, and reseller companies, as the hacking group continues to refine and retool its tactics at an alarming pace in response to public disclosures. The intrusions, which are being tracked by Mandiant under two from The Hacker News https://ift.tt/3GpLvyf via IFTTT

Microsoft Seizes 42 Malicious Web Domains Used By Chinese Hackers

Microsoft on Monday announced the seizure of 42 domains used by a China-based cyber espionage group that set its sights on organizations in the U.S. and 28 other countries pursuant to a legal warrant issued by a federal court in the U.S. state of Virginia. The Redmond company attributed the malicious activities to a group it pursues as Nickel, and by the wider cybersecurity industry under the from The Hacker News https://ift.tt/3IruDsF via IFTTT

Apache Guacamole

Apache Guacamole 495 by WallyFunk | 115 comments on Hacker News.

Latest Firefox 95 Includes RLBox Sandboxing to Protect Browser from Malicious Code

Mozilla is beginning to roll out Firefox 95 with a new sandboxing technology called RLBox that prevents untrusted code and other security vulnerabilities from causing "accidental defects as well as supply-chain attacks." Dubbed "RLBox" and implemented in collaboration with researchers at the University of California San Diego and the University of Texas, the improved protection mechanism is from The Hacker News https://ift.tt/3pAOJYK via IFTTT

CT scans of AirPods evolution

CT scans of AirPods evolution 581 by vitruvius | 152 comments on Hacker News.

Show HN: I made a modern web UI for Wikipedia

Show HN: I made a modern web UI for Wikipedia 580 by sjdz | 268 comments on Hacker News.

YouTube suspended my account for posting DeFi hackathon video

YouTube suspended my account for posting DeFi hackathon video 579 by thijser | 344 comments on Hacker News. I knew Google's automated processes were pretty bad from earlier stories here, but today I got hit by it myself. I participated in the totally legit EthGlobal "Hack Money" hackathon ( https://ift.tt/3c6VSHN ) earlier this year and one of required submissions of that event was a video describing your work. I made one and uploaded it to Youtube. The hackathon went great and we won some prizes but that's not relevant to this story. Yesterday evening I received an email from Youtube that they've removed my channel because "Spam, scams or commercially deceptive content are not allowed on YouTube.". I thought this certainly must be an error so I used the attached appeal link and got a response within less than 15 minutes that they appeal has been rejected and that no further replies will be processed. I am a paid Youtube Music subscriber and I can...

Leaving MySQL

Leaving MySQL 541 by sammorrowdrums | 293 comments on Hacker News.

WhatsApp has removed answer to “how do I choose not to share data with FB”

WhatsApp has removed answer to “how do I choose not to share data with FB” 569 by behnamoh | 154 comments on Hacker News.

Amazon is bypassing supply chain chaos with chartered ships and long-haul planes

Amazon is bypassing supply chain chaos with chartered ships and long-haul planes 538 by thunderbong | 456 comments on Hacker News.

Bumble claims IP rights on employee's open-source libs

Bumble claims IP rights on employee's open-source libs 580 by giansegato | 312 comments on Hacker News.

Malicious KMSPico Windows Activator Stealing Users' Cryptocurrency Wallets

Users looking to activate Windows without using a digital license or a product key are being targeted by tainted installers to deploy malware designed to plunder credentials and other information in cryptocurrency wallets. The malware, dubbed "CryptBot," is an information stealer capable of obtaining credentials for browsers, cryptocurrency wallets, browser cookies, credit cards, and capturing from The Hacker News https://ift.tt/3dqeOnG via IFTTT

Vulnerability Scanning Frequency Best Practices

So you've decided to set up a vulnerability scanning programme, great. That's one of the best ways to avoid data breaches. How often you should run your scans, though, isn't such a simple question. The answers aren't the same for every type of organization or every type of system you're scanning. This guide will help you understand the questions you should be asking and help you come up with the from The Hacker News https://ift.tt/3xYc5LA via IFTTT

Hackers Steal $200 Million Worth of Cryptocurrency Tokens from BitMart Exchange

Cryptocurrency trading platform BitMart has disclosed a "large-scale security breach" that it blamed on a stolen private key, resulting in the theft of more than $150 million in various cryptocurrencies. The breach is said to have impacted two of its hot wallets on the Ethereum (ETH) blockchain and the Binance smart chain (BSC). The company noted that the wallets carried only a "small percentage from The Hacker News https://ift.tt/3Gf0fQk via IFTTT

14 New XS-Leaks (Cross-Site Leaks) Attacks Affect All Modern Web Browsers

Researchers have discovered 14 new types of cross-site data leakage attacks against a number of modern web browsers, including Tor Browser, Mozilla Firefox, Google Chrome, Microsoft Edge, Apple Safari, and Opera, among others. Collectively known as "XS-Leaks," the browser bugs enable a malicious website to harvest personal data from its visitors as they interact with other websites in the from The Hacker News https://ift.tt/31AdhJk via IFTTT

Apple broke up with me

Apple broke up with me 729 by MereCivilian | 489 comments on Hacker News.

YouTube deleting comments who criticize their hiding of the dislike count

YouTube deleting comments who criticize their hiding of the dislike count 694 by jafitc | 435 comments on Hacker News.

Pegasus Spyware Reportedly Hacked iPhones of U.S. State Department and Diplomats

Apple reportedly notified several U.S. Embassy and State Department employees that their iPhones may have been targeted by an unknown assailant using state-sponsored spyware created by the controversial Israeli company NSO Group, according to multiple reports from Reuters and The Washington Post. At least 11 U.S. Embassy officials stationed in Uganda or focusing on issues pertaining to the from The Hacker News https://ift.tt/31vSqH4 via IFTTT

Germany: New government plans 'right to encryption'

Germany: New government plans 'right to encryption' 659 by Audiophilip | 184 comments on Hacker News.

Warning: Yet Another Zoho ManageEngine Product Found Under Active Attacks

Enterprise software provider Zoho on Friday warned that a newly patched critical flaw in its Desktop Central and Desktop Central MSP is being actively exploited by malicious actors, marking the third security vulnerability in its products to be abused in the wild in a span of four months. <!--adsense--> The issue, assigned the identifier CVE-2021-44515, is an authentication bypass vulnerability from The Hacker News https://ift.tt/3GgjzfR via IFTTT

Blender 3.0

Blender 3.0 617 by marcodiego | 187 comments on Hacker News.

U.S. State Department phones hacked with Israeli company spyware

U.S. State Department phones hacked with Israeli company spyware 596 by amadeuspagel | 251 comments on Hacker News.

Researchers Detail How Pakistani Hackers Targeting Indian and Afghan Governments

A Pakistani threat actor successfully socially engineered a number of ministries in Afghanistan and a shared government computer in India to steal sensitive Google, Twitter, and Facebook credentials from its targets and stealthily obtain access to government portals. Malwarebytes' latest findings go into detail about the new tactics and tools adopted by the APT group known as SideCopy, which is from The Hacker News https://ift.tt/3dev4YT via IFTTT

Show HN: Emoji to Scale

Show HN: Emoji to Scale 552 by javierbyte | 109 comments on Hacker News.

New Malvertising Campaigns Spreading Backdoors, Malicious Chrome Extensions

A series of malicious campaigns have been leveraging fake installers of popular apps and games such as Viber, WeChat, NoxPlayer, and Battlefield as a lure to trick users into downloading a new backdoor and an undocumented malicious Google Chrome extension with the goal of stealing credentials and data stored in the compromised systems as well as maintaining persistent remote access. Cisco Talos from The Hacker News https://ift.tt/3pmqGg4 via IFTTT

Why Everyone Needs to Take the Latest CISA Directive Seriously

Government agencies publish notices and directives all the time. Usually, these are only relevant to government departments, which means that nobody else really pays attention. It's easy to see why you would assume that a directive from CISA just doesn't relate to your organization. But, in the instance of the latest CISA directive, that would be making a mistake. In this article, we explain why from The Hacker News https://ift.tt/3Ie4QE9 via IFTTT

FTC sues to block Nvidia-Arm merger

FTC sues to block Nvidia-Arm merger 538 by badwolf | 275 comments on Hacker News.

New Payment Data Sealing Malware Hides in Nginx Process on Linux Servers

E-commerce platforms in the U.S., Germany, and France have come under attack from a new form of malware that targets Nginx servers in an attempt to masquerade its presence and slip past detection by security solutions. "This novel code injects itself into a host Nginx application and is nearly invisible," Sansec Threat Research team said in a new report. "The parasite is used to steal data from from The Hacker News https://ift.tt/3pko4iV via IFTTT

CISA Warns of Actively Exploited Critical Zoho ManageEngine ServiceDesk Vulnerability

The U.S. Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are warning of active exploitation of a newly patched flaw in Zoho's ManageEngine ServiceDesk Plus product to deploy web shells and carry out an array of malicious activities. Tracked as CVE-2021-44077 (CVSS score: 9.8), the issue relates to an unauthenticated, remote code execution from The Hacker News https://ift.tt/3xN3D1M via IFTTT

Ideal Monitor Rotation for Programmers

Ideal Monitor Rotation for Programmers 600 by ghuntley | 324 comments on Hacker News.

Supersonic Trebuchet

Supersonic Trebuchet 626 by wyrm | 217 comments on Hacker News.

Townscaper Running in the Browser

Townscaper Running in the Browser 681 by krstffr | 97 comments on Hacker News.

Stripe hiring issues make some lose job offers

Stripe hiring issues make some lose job offers 531 by wongc | 334 comments on Hacker News.

Ask HN: What are these low quality “code snippet” sites?

Ask HN: What are these low quality “code snippet” sites? 562 by endofreach | 309 comments on Hacker News. Whenever i am trying to google a code issue i have, there is countless low quality sites just showing SO threads with no added value whatsoever. It is so annoying it actually drives me mad. Does anyone know what's up with that? I am really disappointed because the guys creating these sites (i guess for some kind of monetization) must have some relation to coding. But i feel this is an attack against all of us. Every programmer should be grateful for the opportunity to find good quality content quickly. Now my search results are flooded with copy & paste from SO. They are killing that. Am I the only one experiencing this or being that annoyed by it? P.S: I don't name URLs because if you don't know what I am talking about already, you probably don't have that issue.

FBI's ability to legally access secure messaging app content and metadata [pdf]

FBI's ability to legally access secure messaging app content and metadata [pdf] 545 by sega_sai | 443 comments on Hacker News.

AWS Private 5G

AWS Private 5G 584 by Trisell | 354 comments on Hacker News.

100 years of whatever this will be

100 years of whatever this will be 727 by mumblemumble | 480 comments on Hacker News.

Meta Expands Facebook Protect Program to Activists, Journalists, Government Officials

Meta, the company formerly known as Facebook, on Thursday announced an expansion of its Facebook Protect security program to include human rights defenders, activists, journalists, and government officials who are more likely to be targeted by bad actors across its social media platforms. "These people are at the center of critical communities for public debate," said Nathaniel Gleicher, head of from The Hacker News https://ift.tt/31mR9C7 via IFTTT

Researches Detail 17 Malicious Frameworks Used to Attack Air-Gapped Networks

Four different malicious frameworks designed to attack air-gapped networks were detected in the first half of 2020 alone, bringing the total number of such toolkits to 17 and offering adversaries a pathway to cyber espionage and exfiltrate classified information. "All frameworks are designed to perform some form of espionage, [and] all the frameworks used USB drives as the physical transmission from The Hacker News https://ift.tt/3xJS8bo via IFTTT

Let there be light: Ensuring visibility across the entire API lifecycle

The following article is based on a webinar series on enterprise API security by Imvision, featuring expert speakers from IBM, Deloitte, Maersk, and Imvision discussing the importance of centralizing an organization's visibility of its APIs as a way to accelerate remediation efforts and improve the overall security posture. Centralizing security is challenging in today's open ecosystem When from The Hacker News https://ift.tt/3po0l16 via IFTTT

Researchers Warn Iranian Users of Widespread SMS Phishing Campaigns

Socially engineered SMS messages are being used to install malware on Android devices as part of a widespread phishing campaign that impersonates the Iranian government and social security services to make away with credit card details and steal funds from victims' bank accounts. Unlike other variants of banking malware that bank of overlay attacks to capture sensitive data without the knowledge from The Hacker News https://ift.tt/3drEwsd via IFTTT

Russian Man Gets 60 Months Jail for Providing Bulletproof Hosting to Cyber Criminals

A Russian national charged with providing bulletproof hosting services for cybercriminals, who used the platform to spread malware and attack U.S. organizations and financial institutions between 2009 to 2015, has received a 60-month prison sentence. 34-year-old Aleksandr Grichishkin, along with Andrei Skvortsov, founded the bulletproof hosting service and rented its infrastructure to other from The Hacker News https://ift.tt/3od56Lv via IFTTT

Critical Bug in Mozilla’s NSS Crypto Library Potentially Affects Several Other Software

Mozilla has rolled out fixes to address a critical security weakness in its cross-platform Network Security Services (NSS) cryptographic library that could be potentially exploited by an adversary to crash a vulnerable application and even execute arbitrary code. Tracked as CVE-2021-43527, the flaw affects NSS versions prior to 3.73 or 3.68.1 ESR, and concerns a heap overflow vulnerability when from The Hacker News https://ift.tt/3odEuu0 via IFTTT

Advent of Code 2021

Advent of Code 2021 622 by ducharmdev | 242 comments on Hacker News.

This shouldn't have happened: A vulnerability postmortem

This shouldn't have happened: A vulnerability postmortem 608 by trulyrandom | 222 comments on Hacker News.

New EwDoor Botnet Targeting Unpatched AT&T Network Edge Devices

A newly discovered botnet capable of staging distributed denial-of-service (DDoS) attacks targeted unpatched Ribbon Communications (formerly Edgewater Networks) EdgeMarc appliances belonging to telecom service provider AT&T by exploiting a four-year-old flaw in the network appliances. Chinese tech giant Qihoo 360's Netlab network security division, which detected the botnet first on October 27, from The Hacker News https://ift.tt/3G3CEBZ via IFTTT

Hackers Increasingly Using RTF Template Injection Technique in Phishing Attacks

Three different state-sponsored threat actors aligned with China, India, and Russia have been observed adopting a new method called RTF (aka Rich Text Format) template injection as part of their phishing campaigns to deliver malware to targeted systems. "RTF template injection is a novel technique that is ideal for malicious phishing attachments because it is simple and allows threat actors to from The Hacker News https://ift.tt/3D9tXUL via IFTTT

Hacker Jailed for Stealing Millions of Dollars in Cryptocurrencies by SIM Hijacking

A sixth member associated with an international hacking group known as The Community has been sentenced in connection with a multimillion-dollar SIM swapping conspiracy, the U.S. Department of Justice (DoJ) said. Garrett Endicott, 22, from the U.S. state of Missouri, who pleaded guilty to charges of wire fraud and aggravated identity theft following an indictment in 2019, was sentenced to 10 from The Hacker News https://ift.tt/31fVHdC via IFTTT