Posts

Showing posts from August, 2022

Apple Releases iOS Update for Older iPhones to Fix Actively Exploited Vulnerability

Apple on Wednesday backported security updates to older iPhones, iPads, and iPod touch devices to address a critical security flaw that has been actively exploited in the wild. The issue, tracked as CVE-2022-32893 (CVSS score: 8.8), is an out-of-bounds write issue affecting WebKit that could lead to arbitrary code execution when processing maliciously crafted web content. The tech from The Hacker News https://ift.tt/JkiwVZo via IFTTT

90s Cursor Effects

90s Cursor Effects 585 by lysergia | 167 comments on Hacker News.

Google cracks down on VPN based adblockers

Google cracks down on VPN based adblockers 560 by balboah | 583 comments on Hacker News.

Weird monitor bugs people sent me in the last 5 years

Weird monitor bugs people sent me in the last 5 years 513 by alin23 | 214 comments on Hacker News.

Don’t think to write, write to think

Don’t think to write, write to think 488 by herbertl | 137 comments on Hacker News.

JSON Crack – Visualize JSON data into graphs

JSON Crack – Visualize JSON data into graphs 555 by iCutMoon | 94 comments on Hacker News.

Time Till Open Source Alternative

Time Till Open Source Alternative 496 by feross | 330 comments on Hacker News.

4.2 Gigabytes, Or: How to Draw Anything

4.2 Gigabytes, Or: How to Draw Anything 705 by andy_xor_andrew | 170 comments on Hacker News.

FTC Sues Data Broker Over Selling Location Data for Hundreds of Millions of Phones

The U.S. Federal Trade Commission (FTC) on Monday said it filed a lawsuit against Kochava, a location data broker, for collecting and selling precise geolocation data gathered from consumers' mobile devices. The complaint alleges that the U.S. company amasses a "wealth of information" about users by purchasing data from other data brokers to sell to its own clients. "Kochava then sells from The Hacker News https://ift.tt/QUtiGTJ via IFTTT

Welcome Home, Garry Tan

Welcome Home, Garry Tan 640 by todsacerdoti | 234 comments on Hacker News.

The Big [Censored] Theory

The Big [Censored] Theory 564 by feross | 289 comments on Hacker News.

New Golang-based 'Agenda Ransomware' Can Be Customized For Each Victim

A new ransomware strain written in Golang dubbed "Agenda" has been spotted in the wild, targeting healthcare and education entities in Indonesia, Saudi Arabia, South Africa, and Thailand. "Agenda can reboot systems in safe mode, attempts to stop many server-specific processes and services, and has multiple modes to run," Trend Micro researchers said in an analysis last week. Qilin, the threat from The Hacker News https://ift.tt/ul4m1on via IFTTT

Nitrokod Crypto Miner Infected Over 111,000 Users with Copies of Popular Software

A Turkish-speaking entity called Nitrokod has been attributed to an active cryptocurrency mining campaign that involves impersonating a desktop application for Google Translate to infect over 111,000 victims in 11 countries since 2019.  "The malicious tools can be used by anyone," Maya Horowitz, vice president of research at Check Point, said in a statement shared with The Hacker News. "They can from The Hacker News https://ift.tt/Er74X2t via IFTTT

A CISO's Ultimate Security Validation Checklist

If you're heading out of the office on a well-deserved vacation, are you certain the security controls you have in place will let you rest easy while you're away? More importantly – do you have the right action plan in place for a seamless return? Whether you're on the way out of – or back to – the office, our Security Validation Checklist can help make sure your security posture is in good from The Hacker News https://ift.tt/8QnMHRK via IFTTT

Twilio Breach Also Compromised Authy Two-Factor Accounts of Some Users

Twilio, which earlier this month became a sophisticated phishing attack, disclosed last week that the threat actors also managed to gain access to the accounts of 93 individual users of its Authy two-factor authentication (2FA) service. The communication tools company said the unauthorized access made it possible for the adversary to register additional devices to those accounts. It has since from The Hacker News https://ift.tt/3QGcyZ6 via IFTTT

CISA Adds 10 New Known Actively Exploited Vulnerabilities to its Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added 10 new actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, including a high-severity security flaw affecting industrial automation software from Delta Electronics. The issue, tracked as CVE-2021-38406 (CVSS score: 7.8), impacts DOPSoft 2 versions 2.00.07 and prior. A successful from The Hacker News https://ift.tt/E73tBvX via IFTTT

One kitchen, hundreds of internet restaurants

One kitchen, hundreds of internet restaurants 508 by donbox | 261 comments on Hacker News.

Slack’s free plan change is causing an exodus

Slack’s free plan change is causing an exodus 467 by williamstein | 487 comments on Hacker News.

Why no Roman industrial revolution?

Why no Roman industrial revolution? 455 by Tomte | 460 comments on Hacker News.

Iranian Hackers Exploiting Unpatched Log4j 2 Bugs to Target Israeli Organizations

Iranian state-sponsored actors are leaving no stone unturned to exploit unpatched systems running Log4j to target Israeli entities, indicating the vulnerability’s long tail for remediation. Microsoft attributed the latest set of activities to the umbrella threat group tracked as MuddyWater (aka Cobalt Ulster, Mercury, Seedworm, or Static Kitten), which is linked to the Iranian intelligence from The Hacker News https://ift.tt/AgXtP4Y via IFTTT

Engineer distributes resume via IPv6 traceroute

Engineer distributes resume via IPv6 traceroute 451 by fjarlq | 108 comments on Hacker News.

Critical Vulnerability Discovered in Atlassian Bitbucket Server and Data Center

Atlassian has rolled out fixes for a critical security flaw in Bitbucket Server and Data Center that could lead to the execution of malicious code on vulnerable installations. Tracked as CVE-2022-36804 (CVSS score: 9.9), the issue has been characterized as a command injection vulnerability in multiple endpoints that could be exploited via specially crafted HTTP requests. “An from The Hacker News https://ift.tt/vaFrIqS via IFTTT

Mainnet Merge Announcement

Mainnet Merge Announcement 537 by bowsamic | 577 comments on Hacker News.

Things people blamed on bicycles

Things people blamed on bicycles 751 by the-archivist | 809 comments on Hacker News.

Hackers Breach LastPass Developer System to Steal Source Code

Password management service LastPass confirmed a security incident that resulted in the theft of certain source code and technical information. The security breach is said to have occurred two weeks ago, targeting its development environment. No customer data or encrypted passwords were accessed. “An unauthorized party gained access to portions of the LastPass development from The Hacker News https://ift.tt/2LVcOve via IFTTT

Cybercrime Groups Increasingly Adopting Sliver Command-and-Control Framework

Nation-state threat actors are increasingly adopting and integrating the Sliver command-and-control (C2) framework in their intrusion campaigns as a replacement for Cobalt Strike. “Given Cobalt Strike’s popularity as an attack tool, defenses against it have also improved over time,” Microsoft security experts said. “Sliver thus presents an attractive alternative for actors looking for a from The Hacker News https://ift.tt/nAIpSY3 via IFTTT

Okta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizations

The threat actor behind the attacks on Twilio and Cloudflare earlier this month has been linked to a broader phishing campaign aimed at 136 organizations that resulted in a cumulative compromise of 9,931 accounts. The activity has been condemned 0ktapus by Group-IB because the initial goal of the attacks was to "obtain Okta identity credentials and two-factor authentication (2FA) codes from from The Hacker News https://ift.tt/kcie9zZ via IFTTT

Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers

The threat actor behind the SolarWinds supply chain attack has been linked to yet another "highly targeted" post-exploitation malware that could be used to maintain persistent access to compromised environments. Dubbed MagicWeb by Microsoft's threat intelligence teams, the development reiterates Nobelium's commitment to developing and maintaining purpose-built capabilities. Nobelium is the tech from The Hacker News https://ift.tt/iGUXKaf via IFTTT

U.S. Government Spending Billions on Cybersecurity

In recent months, the House of Representatives has been hard at work drafting various spending bills for the 2023 fiscal year. While these bills provide funding for a vast array of government programs and agencies, there was one thing that really stands out. Collectively, the bills that are making their way through the house allocate a staggering $15.6 billion to cybersecurity spending. As you from The Hacker News https://ift.tt/zYKEXLH via IFTTT

Researchers Uncover Kimusky Infra Targeting South Korean Politicians and Diplomats

The North Korean nation-state group Kimusky has been linked to a new set of malicious activities directed against political and diplomatic entities located in its southern counterpart in early 2022. Russian cybersecurity firm Kaspersky codenamed the cluster GoldDragon, with the infection chains leading to the deployment of Windows malware designed to file lists, user keystrokes, and stored web from The Hacker News https://ift.tt/LVD8Ihv via IFTTT

Patent Trolls Inbound: Our First Lawsuit

Patent Trolls Inbound: Our First Lawsuit 776 by arduinomancer | 188 comments on Hacker News.

PyPI Repository Warns Python Project Maintainers About Ongoing Phishing Attacks

The Python Package Index, PyPI, on Wednesday sounded the alarm about an ongoing phishing campaign that aims to steal developer credentials and inject malicious updates to legitimate packages. "This is the first known phishing attack against PyPI," the maintainers of the official third-party software repository said in a series of tweets. The social engineering attack entails sending from The Hacker News https://ift.tt/yXHjAeg via IFTTT

Guide: How Service Providers can Deliver vCISO Services at Scale

From ransomware to breaches, from noncompliance penalties to reputational damage – cyberthreats pose an existential risk to any business. But for SMEs and SMBs, the danger is compounded. These companies realize they need an in-house Chief Information Security Officer (CISO) – someone who can assess risks and vulnerabilities, create and execute a comprehensive cybersecurity plan, ensure from The Hacker News https://ift.tt/ams0ErR via IFTTT

Hackers Using Fake DDoS Protection Pages to Distribute Malware

WordPress sites are being hacked to display fraudulent Cloudflare DDoS protection pages that lead to the delivery of malware such as NetSupport RAT and Raccoon Stealer. "A recent surge in JavaScript injections targeting WordPress sites has resulted in fake DDoS prevent prompts which lead victims to download remote access trojan malware," Sucuri's Ben Martin said in a write-up published last week from The Hacker News https://ift.tt/7Cy4WQe via IFTTT

Researchers Warn of AiTM Attack Targeting Google G-Suite Enterprise Users

The threat actors behind a large-scale adversary-in-the-middle (AiTM) phishing campaign targeting enterprise users of Microsoft email services have also set their sights on Google Workspace users. "This campaign specifically targeted chief executives and other senior members of various organizations which use [Google Workspace]," Zscaler researchers Sudeep Singh and Jagadeeswar Ramanukolanu  from The Hacker News https://ift.tt/zqsVpwc via IFTTT

GitLab Issues Patch for Critical Flaw in its Community and Enterprise Software

DevOps platform GitLab this week issued patches to address a critical security flaw in its software that could lead to arbitrary code execution on affected systems. Tracked as CVE-2022-2884, the issue is rated 9.9 on the CVSS vulnerability scoring system and impacts all versions of GitLab Community Edition (CE) and Enterprise Edition (EE) starting from 11.3.4 before 15.1.5, 15.2 before 15.2.3, from The Hacker News https://ift.tt/x75ALVm via IFTTT

Design the next iPhone

Design the next iPhone 785 by mkeeter | 217 comments on Hacker News.

Ex-Twitter exec blows the whistle, alleging reckless cybersecurity policies

Ex-Twitter exec blows the whistle, alleging reckless cybersecurity policies 743 by razin | 429 comments on Hacker News.

The Rise of Data Exfiltration and Why It Is a Greater Risk Than Ransomware

Ransomware is the de facto threat organizations have faced over the past few years. Threat actors were making easy money by exploiting the high valuation of cryptocurrencies and their victims' lack of adequate preparation.  Think about bad security policies, untested backups, patch management practices not up-to-par, and so forth. It resulted in easy growth for ransomware extortion, a crime that from The Hacker News https://ift.tt/y14nOTW via IFTTT

Suspected Iranian Hackers Targeted Several Israeli Organizations for Espionage

A suspected Iranian threat activity cluster has been linked to attacks aimed at Israeli shipping, government, energy, and healthcare organizations as part of an espionage-focused campaign that commenced in late 2020. Cybersecurity firm Mandiant is tracking the group under its uncategorized moniker UNC3890, which is believed to conduct operations that align with Iranian interests. "The collected from The Hacker News https://ift.tt/7r3w8Nj via IFTTT

Stable Diffusion Public Release

Stable Diffusion Public Release 658 by flimsythoughts | 370 comments on Hacker News.

New Air-Gap Attack Uses MEMS Gyroscope Ultrasonic Covert Channel to Leak Data

A novel data exfiltration technique has been found to leverage a covert ultrasonic channel to leak sensitive information from isolated, air-gapped computers to a nearby smartphone that doesn't even require a microphone to pick up the sound waves. Dubbed GAIROSCOPE, the adversarial model is the latest addition to a long list of acoustic, electromagnetic, optical, and thermal approaches devised by from The Hacker News https://ift.tt/hGbivnR via IFTTT

Nobody wants to teach anymore

Nobody wants to teach anymore 641 by grej | 955 comments on Hacker News.

CISA Warns of Active Exploitation of Palo Alto Networks' PAN-OS Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. The high-severity vulnerability, tracked as CVE-2022-0028 (CVSS score: 8.6), is a URL filtering policy misconfiguration that could allow an unauthenticated, remote attacker to from The Hacker News https://ift.tt/8NLx3km via IFTTT

Researchers Find Counterfeit Phones with Backdoor to Hack WhatsApp Accounts

Budget Android device models that are counterfeit versions associated with popular smartphone brands are harboring multiple trojans designed to target WhatsApp and WhatsApp Business messaging apps. The trojans, which Doctor Web first came across in July 2022, were discovered in the system partition of at least four different smartphones: P48pro, radmi note 8, Note30u, and Mate40, was "These from The Hacker News https://ift.tt/V92IgrX via IFTTT

"As Nasty as Dirty Pipe" — 8 Year Old Linux Kernel Vulnerability Uncovered

Details of an eight-year-old security vulnerability in the Linux kernel have emerged that the researchers say is "as nasty as Dirty Pipe." Dubbed DirtyCred by a group of academics from Northwestern University, the security weakness exploits a previously unknown flaw (CVE-2022-2588) to escalate privileges to the maximum level. "DirtyCred is a kernel exploitation concept that swaps unprivileged  from The Hacker News https://ift.tt/il6D91t via IFTTT

Meet Borat RAT, a New Unique Triple Threat

Atlanta-based cyber risk intelligence company, Cyble discovered a new Remote Access Trojan (RAT) malware. What makes this particular RAT malware distinct enough to be named after the comic creation of Sacha Baron Cohen? RAT malware typically helps cybercriminals gain complete control of a victim's system, permitting them to access network resources, files, and power to toggle the mouse and from The Hacker News https://ift.tt/fjelIuK via IFTTT

Tell HN: Google Cloud suspended our production projects at 1am on Saturday

Tell HN: Google Cloud suspended our production projects at 1am on Saturday 650 by 7tech | 268 comments on Hacker News. TLDR; never use google cloud systems for production. Google cloud suspended all our projects due to the billing issue in their system they had. Despite reassurances "your account will not be suspended" while communicating with billing support, all the projects were suspended at 1am on Saturday. All the account payments were made and the billing cards are valid. There are no outstanding bills. Never use GCP for production. ---- Edit: full story by request, long read: ---- Previous month billing didn't went through. Not sure if this was due to the billing outage google had (https://ift.tt/vDlpPOd) or financial transaction issue, however we went ahead and made a manual payment covering all the outstanding amount + extra. Despite the payment made, about a week+ later we suddenly started receiving threatening emails "Your Projects are at risk of suspen...

RTLS Systems Found Vulnerable to MiTM Attacks and Location Tampering

Researchers have disclosed multiple vulnerabilities impacting Ultra-wideband (UWB) Real-time Locating Systems (RTLS), enabling threat actors to launch adversary-in-the-middle (AitM) attacks and tamper with location data. "The zero-days found specifically pose a security risk for workers in industrial environments," cybersecurity firm Nozomi Networks disclosed in a technical write-up last week. " from The Hacker News https://ift.tt/kILHKcM via IFTTT

There’s no speed limit (2009)

There’s no speed limit (2009) 627 by melling | 263 comments on Hacker News.

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability

Bitcoin ATM manufacturer General Bytes confirmed that it was a victim of a cyberattack that exploited a previously unknown flaw in its software to plunder cryptocurrency from its users. "The attacker was able to create an admin user remotely via CAS administrative interface via a URL call on the page that is used for the default installation on the server and creating the first administration from The Hacker News https://ift.tt/kzfsgeQ via IFTTT

A dad took photos of his naked child for a doctor; Google reported him to police

A dad took photos of his naked child for a doctor; Google reported him to police 608 by dklsf | 355 comments on Hacker News.

New Grandoreiro Banking Malware Campaign Targeting Spanish Manufacturers

Organizations in the Spanish-speaking nations of Mexico and Spain are in the crosshairs of a new campaign designed to deliver the Grandoreiro banking trojan.  "In this campaign, the threat actors impersonate government officials from the Attorney General's Office of Mexico City and from the Public Ministry in the form of spear-phishing emails in order to lure victims to download and execute ' from The Hacker News https://ift.tt/2wnjvrd via IFTTT

Become a Cybersecurity Expert with 18 New Online Courses @ 98% OFF

With more data stored in the cloud than ever before, now is a good time to get into cybersecurity. Many top corporations are looking for new talent, and even junior professionals can earn $80,000 or more. The only barrier to entry is education. How do you learn about security protocols and white hat hacking? Enter the All-In-One 2022 Super-Sized Ethical Hacking Bundle. This collection of 18 from The Hacker News https://ift.tt/qkOhXy7 via IFTTT

CISA Adds 7 New Actively Exploited Vulnerabilities to Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday moved to add a critical SAP security flaw to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. The issue in question is CVE-2022-22536, which has received the highest possible risk score of 10.0 on the CVSS vulnerability scoring system and was addressed by SAP as part of its Patch from The Hacker News https://ift.tt/ZOmwACz via IFTTT

DoNot Team Hackers Updated its Malware Toolkit with Improved Capabilities

The Donot Team threat actor has updated its Jaca Windows malware toolkit with improved capabilities, including a revamped stealer module designed to plunder information from Google Chrome and Mozilla Firefox browsers. The improvements also include a new infection chain that incorporates previously undocumented components to the modular framework, Morphisec researchers Hido Cohen and Arnold from The Hacker News https://ift.tt/8Cw4eDr via IFTTT

Cybercrime Group TA558 Targeting Hospitality, Hotel, and Travel Organizations

A financially motivated cybercrime group has been linked to an ongoing wave of attacks aimed at hospitality, hotel, and travel organizations in Latin America with the goal of installing malware on compromised systems. Enterprise security firm Proofpoint, which is tracking the group under the name TA558 dating all the way back to April 2018, called it a "small crime threat actor." "Since 2018, from The Hacker News https://ift.tt/Jp9ktqb via IFTTT

Google Cloud Blocks Record DDoS attack of 46 Million Requests Per Second

Google's cloud division on Thursday disclosed it mitigated a series of HTTPS distributed denial-of-service (DDoS) attacks which peaked at 46 million requests per second (RPS), making it the largest such recorded to date. The attack, which occurred on June 1, targeting an unnamed Google Cloud Armor customer, is 76% larger than the 26 million RPS DDoS attack repealed by Cloudflare earlier this from The Hacker News https://ift.tt/mailb0I via IFTTT

New Amazon Ring Vulnerability Could Have Exposed All Your Camera Recordings

Retail giant Amazon patched a high-severity security issue in its Ring app for Android in May that could have enabled a rogue application installed on a user's device to access sensitive information and camera recordings. The Ring app for Android has over 10 million downloads and enables users to monitor video feeds from smart home devices such as video doorbells, security cameras, and alarm from The Hacker News https://ift.tt/bGekfmB via IFTTT

See what JavaScript commands get injected through an in-app browser

See what JavaScript commands get injected through an in-app browser 572 by krausefx | 244 comments on Hacker News.

Learn to sew your own outdoor gear

Learn to sew your own outdoor gear 549 by almog | 115 comments on Hacker News.

Penetration Testing or Vulnerability Scanning? What's the Difference?

Pentesting and vulnerability scanning are often confused for the same service. The problem is, business owners often use one when they really need the other. Let's dive in and explain the differences. People frequently confuse penetration testing and vulnerability scanning, and it's easy to see why. Both look for weaknesses in your IT infrastructure by exploring your systems in the same way an from The Hacker News https://ift.tt/RsZLI4q via IFTTT

Accounting For Developers, Part I

Accounting For Developers, Part I 565 by qin | 178 comments on Hacker News.

Learn Postgres at the Playground – Postgres compiled to WASM running in browser

Learn Postgres at the Playground – Postgres compiled to WASM running in browser 607 by samwillis | 152 comments on Hacker News.

Researchers Link Multi-Year Mass Credential Theft Campaign to Chinese Hackers

A Chinese state-sponsored threat activity group named RedAlpha has been attributed to a multi-year mass credential theft campaign aimed at global humanitarian, think tank, and government organizations. "In this activity, RedAlpha very likely sought to gain access to email accounts and other online communications of targeted individuals and organizations," Recorded Future disclosed in a new from The Hacker News https://ift.tt/sPMR6cG via IFTTT

Using the same Arch Linux installation for a decade

Using the same Arch Linux installation for a decade 483 by meribold | 379 comments on Hacker News.

Lean Security 101: 3 Tips for Building Your Framework

Cobalt, Lazarus, MageCart, Evil, Revil — cybercrime syndicates spring up so fast it's hard to keep track. Until…they infiltrate your system. But you know what's even more overwhelming than rampant cybercrime? Building your organization's security framework.  CIS, NIST, PCI DSS, HIPAA, HITrust, and the list goes on. Even if you had the resources to implement every relevant industry standard and from The Hacker News https://ift.tt/2b4rFeB via IFTTT

Ask HN: In 2022, what is the proper way to get into machine/deep learning?

Ask HN: In 2022, what is the proper way to get into machine/deep learning? 481 by newsoul | 187 comments on Hacker News. By getting into machine or deep learning I mean building upto a stage to do ML/DL research. Applied research or core theory of ML/DL research. Ofcourse, the path to both will quite different. Standing in 2022, what are the best resources for a CS student/decent programmer to get into the field of ML and DL on their own. Resources can be both books or public courses. The target ability: 1. To understand the theory behind the algorithms 2. To implement an algorithm on a dataset of choice. (Data cleaning and management should also be learned) 3. Read research publications and try to implement them.

Malicious Browser Extensions Targeted Over a Million Users So Far This Year

More than 1.31 million users attempted to install malicious or unwanted web browser extensions at least once, new findings from cybersecurity firm Kaspersky show. "From January 2020 to June 2022, more than 4.3 million unique users were attacked by adware hiding in browser extensions, which is approximately 70% of all users affected by malicious and unwanted add-ons," the company said. As many as from The Hacker News https://ift.tt/Eqo91YJ via IFTTT

North Korea Hackers Spotted Targeting Job Seekers with macOS Malware

The North Korea-backed Lazarus Group has been observed targeting job seekers with malware capable of executing on Apple Macs with Intel and M1 chipsets. Slovak cybersecurity firm ESET linked it to a campaign dubbed "Operation In(ter)ception" that was first disclosed in June 2020 and involved using social engineering tactics to trick employees working in the aerospace and military sectors into from The Hacker News https://ift.tt/3q1xjWY via IFTTT

RubyGems Makes Multi-Factor Authentication Mandatory for Top Package Maintainers

RubyGems, the official package manager for the Ruby programming language, has become the latest platform to mandate multi-factor authentication (MFA) for popular package maintainers, following the footsteps of NPM and PyPI. To that end, owners of gems with over 180 million total downloads are mandated to turn on MFA effective August 15, 2022. "Users in this category who do not from The Hacker News https://ift.tt/T6JaX3y via IFTTT

Unified Threat Management: The All-in-One Cybersecurity Solution

UTM (Unified threat management) is thought to be an all-in-one solution for cybersecurity. In general, it is a versatile software or hardware firewall solution integrated with IPS (Intrusion Prevention System) and other security services. A universal gateway allows the user to manage network security with one comprehensive solution, which makes the task much easier. In addition, compared to a from The Hacker News https://ift.tt/Afcz6Gl via IFTTT

Microsoft Warns About Phishing Attacks by Russia-linked Hackers

Microsoft on Monday revealed it took steps to disrupt phishing operations undertaken by a "highly persistent threat actor" whose objectives align closely with Russian state interests. The company is tracking the espionage-oriented activity cluster under its chemical element-themed moniker SEABORGIUM, which it said overlaps with a hacking group also known as Callisto, COLDRIVER, and TA446. " from The Hacker News https://ift.tt/vMCnr9B via IFTTT

Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware

Russian state-sponsored actors are continuing to strike Ukrainian entities with information-stealing malware as part of what's suspected to be an espionage operation. Symantec, a division of Broadcom Software, attributed the malicious campaign to a threat actor tracked Shuckworm, also known as Actinium, Armageddon, Gamaredon, Primitive Bear, and Trident Ursa. The findings have been corroborated  from The Hacker News https://ift.tt/SPFq5HY via IFTTT

Nearly 1,900 Signal Messenger Accounts Potentially Compromised in Twilio Hack

Popular end-to-end encrypted messaging service Signal on Monday disclosed the cyberattack aimed at Twilio earlier this month may have exposed the phone numbers of roughly 1,900 users. "For about 1,900 users, an attacker could have attempted to re-register their number to another device or learned that their number was registered to Signal," the company said. "All users can rest assured that from The Hacker News https://ift.tt/WQnaH2u via IFTTT

Twilio incident: What Signal users need to know

Twilio incident: What Signal users need to know 471 by input_sh | 380 comments on Hacker News.

Add ability to choose a custom coordination server

Add ability to choose a custom coordination server 450 by hooooonk | 85 comments on Hacker News.

Credential Theft Is (Still) A Top Attack Method

Credential theft is clearly still a problem. Even after years of warnings, changing password requirements, and multiple forms of authentication, password stealing remains a top attack method used by cyber criminals. The latest report from the Ponemon Institute shares that 54% of security incidents were caused by credential theft, followed by ransomware and DDoS attacks. 59% of organizations from The Hacker News https://ift.tt/HFjeLw9 via IFTTT

It’s raining PFAS: rainwater is unsafe to drink even in Antarctica and Tibet

It’s raining PFAS: rainwater is unsafe to drink even in Antarctica and Tibet 499 by nabla9 | 423 comments on Hacker News.

Ask HN: Anyone else feels the commoditization of real estate is unethical?

Ask HN: Anyone else feels the commoditization of real estate is unethical? 463 by newbie578 | 715 comments on Hacker News. I am reading more and more about startups which are focusing on investments in real estate [1]. Doesn't anyone feel uneasy about it, that more and more people are looking at real estate as a financial tool, not a basic human right to have a roof over one's head? Aren't startups like this just adding oil to the fire which is the real estate market? I do not understand how will someone expect for future generations to achieve their own personal freedom and living inside their own four walls. [1] - https://ift.tt/UALMzDK

Study finds link between 'forever chemicals' in cookware and liver cancer

Study finds link between 'forever chemicals' in cookware and liver cancer 417 by pseudolus | 385 comments on Hacker News.

Arrest of suspected developer of Tornado Cash

Arrest of suspected developer of Tornado Cash 437 by langitbiru | 762 comments on Hacker News.

Newly Uncovered PyPI Package Drops Fileless Cryptominer to Linux Systems

A now-removed rogue package pushed to the official third-party software repository for Python has been found to deploy cryptominers on Linux systems. The module, named "secretslib" and downloaded 93 times prior to its deletion, was released to the Python Package Index (PyPI) on August 6, 2022 and is described as "secrets matching and verification made easy." "On a closer from The Hacker News https://ift.tt/OoW1sqK via IFTTT

Goat Rental – Hire Goats

Goat Rental – Hire Goats 415 by deanstag | 257 comments on Hacker News.

Is this the end of social networking?

Is this the end of social networking? 553 by ZacnyLos | 462 comments on Hacker News.

Spent $15 in DALL·E 2 credits creating this AI image

Spent $15 in DALL·E 2 credits creating this AI image 453 by pat-jay | 149 comments on Hacker News.

I hacked my car

I hacked my car 582 by ytpete | 112 comments on Hacker News.

Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer

Dutch authorities on Friday announced the arrest of a software developer in Amsterdam who is alleged to be working for Tornado Cash, days after the U.S. sanctioned the decentralized crypto mixing service. The 29-year-old individual is "suspected of involvement in concealing criminal financial flows and facilitating money laundering" through the service, the Dutch Fiscal Information and from The Hacker News https://ift.tt/iAcqklD via IFTTT

The Zoom installer let a researcher hack his way to root access on macOS

The Zoom installer let a researcher hack his way to root access on macOS 561 by neodypsis | 337 comments on Hacker News.

Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users

A pair of reports from cybersecurity firms SEKOIA and Trend Micro sheds light on a new campaign undertaken by a Chinese threat actor named Lucky Mouse that involves leveraging a trojanized version of a cross-platform messaging app to backdoor systems. Infection chains leverage a chat application called MiMi, with its installer files compromised to download and install HyperBro samples for the from The Hacker News https://ift.tt/fPjzKNi via IFTTT

Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders

A security feature bypass vulnerability has been uncovered in three signed third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypass of the UEFI Secure Boot feature. "These vulnerabilities can be exploited by mounting the EFI System Partition and replacing the existing bootloader with the vulnerable one, or modifying a UEFI variable to load the vulnerable loader from The Hacker News https://ift.tt/Uj13Pyn via IFTTT

Cisco Patches High-Severity Vulnerability Affecting ASA and Firepower Solutions

Cisco on Wednesday released patches to contain multiple flaws in its software that could be abused to leak sensitive information on susceptible appliances. The issue, assigned the identifier CVE-2022-20866 (CVSS score: 7.4), has been described as a "logic error" when handling RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) from The Hacker News https://ift.tt/KYpZE7V via IFTTT

Fast and Secure VPN on a Budget? Private Internet Access VPN Has You Covered

Back when the internet consisted of a handful of computers networked together across a few research institutions, nobody could have imagined that it would one day form the backbone of a new digital way of life. And that probably explains why none of the researchers who thought up its core technologies — things like packet switching and TCP/IP — gave much consideration to the need to secure the from The Hacker News https://ift.tt/QpT5621 via IFTTT

Researchers Warn of Ongoing Mass Exploitation of Zimbra RCE Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two flaws to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The two high-severity issues relate to weaknesses in Zimbra Collaboration, both of which could be chained to achieve unauthenticated remote code execution on affected email servers - CVE-2022-27925 (CVSS score: 7.2) from The Hacker News https://ift.tt/pbrBVUh via IFTTT

A 17-year-old designed a novel synchronous reluctance motor

A 17-year-old designed a novel synchronous reluctance motor 567 by evo_9 | 235 comments on Hacker News.

Conti Cybercrime Cartel Using 'BazarCall' Phishing Attacks as Initial Attack Vector

Three different offshoots of the notorious Conti cybercrime cartel have resorted to the technique of call-back phishing as an initial access vector to breach targeted networks. "Three autonomous threat groups have since adopted and independently developed their own targeted phishing tactics derived from the call back phishing methodology," cybersecurity firm AdvIntel said in a Wednesday report. from The Hacker News https://ift.tt/rKRE8hF via IFTTT

Hackers Behind Cuba Ransomware Attacks Using New RAT Malware

Threat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques and procedures (TTPs), including a new remote access trojan called ROMCOM RAT on compromised systems. The new findings come from Palo Alto Networks' Unit 42 threat intelligence team, which is tracking the double extortion ransomware group under the constellation-themed moniker  from The Hacker News https://ift.tt/26yIgJw via IFTTT

What the Zola Hack Can Teach Us About Password Security

Password security is only as strong as the password itself. Unfortunately, we are often reminded of the danger of weak, reused, and compromised passwords with major cybersecurity breaches that start with stolen credentials. For example, in May 2022, the popular wedding planning site, Zola, was the victim of a significant cybersecurity breach where hackers used an attack known as credential from The Hacker News https://ift.tt/w09Iysl via IFTTT

Critical Flaws Disclosed in Device42 IT Asset Management Software

Cybersecurity researchers have disclosed multiple severe security vulnerabilities asset management platform Device42 that, if successfully exploited, could enable a malicious actor to seize control of affected systems. "By exploiting these issues, an attacker could impersonate other users, obtain admin-level access in the application (by leaking session with an LFI) or obtain full access to the from The Hacker News https://ift.tt/f7OEc1z via IFTTT

GitHub Dependabot Now Alerts Developers On Vulnerable GitHub Actions

Cloud-based code hosting platform GitHub has announced that it will now start sending Dependabot alerts for vulnerable GitHub Actions to help developers fix security issues in CI/CD workflows. "When a security vulnerability is reported in an action, our team of security researchers will create an advisory to document the vulnerability, which will trigger an alert to impacted repositories," from The Hacker News https://ift.tt/035lOH8 via IFTTT

'Too many employees, but few work': Pichai, Zuckerberg sound the alarm

'Too many employees, but few work': Pichai, Zuckerberg sound the alarm 449 by quaffapint | 716 comments on Hacker News.

Hackers Behind Twilio Breach Also Targeted Cloudflare Employees

Web infrastructure company Cloudflare on Tuesday disclosed at least 76 employees and their family members received text messages on their personal and work phones bearing similar characteristics as that of the sophisticated phishing attack against Twilio. The attack, which transpired around the same time Twilio was targeted, came from four phone numbers associated with T-Mobile-issued SIM cards from The Hacker News https://ift.tt/OxjuB4f via IFTTT

Ask HN: What's the next big thing that few people are talking about?

Ask HN: What's the next big thing that few people are talking about? 399 by ScottStevenson | 1076 comments on Hacker News. Blockchain & AI don't count, because they're being talked about plenty!

CISA Issues Warning on Active Exploitation of UnRAR Software for Linux Systems

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw in the UnRAR utility to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. Tracked as CVE-2022-30333 (CVSS score: 7.5), the issue concerns a path traversal vulnerability in the Unix versions of UnRAR that can be triggered upon extracting a from The Hacker News https://ift.tt/Qgb9fmn via IFTTT

Microsoft Issues Patches for 121 Flaws, Including Zero-Day Under Active Attack

As many as 121 new security flaws were patched by Microsoft as part of its Patch Tuesday updates for the month of August, which also includes a fix for a Support Diagnostic Tool vulnerability that the company said is being actively exploited in the wild. Of the 121 bugs, 17 are rated Critical, 102 are rated Important, one is rated Moderate, and one is rated Low in severity. Two of the issues from The Hacker News https://ift.tt/4Ma10TI via IFTTT

“It’s time for Apple to fix texting”

“It’s time for Apple to fix texting” 430 by Fabricio20 | 570 comments on Hacker News.

An incident impacting 5M accounts and private information on Twitter

An incident impacting 5M accounts and private information on Twitter 443 by WaitWaitWha | 282 comments on Hacker News.

VMware Releases Patches for Several New Flaws Affecting Multiple Products

Virtualization services provider VMware on Tuesday shipped updates to address 10 security flaws affecting multiple products that could be abused by unauthenticated attackers to perform malicious actions. The issues, tracked from CVE-2022-31656 through CVE-2022-31665 (CVSS scores: 4.7 - 9.8), impact VMware Workspace ONE Access, Workspace ONE Access Connector, Identity Manager, Identity Manager from The Hacker News https://ift.tt/0IdRCvV via IFTTT

Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike

Researchers have disclosed a new offensive framework referred to as Manjusaka that they call is a "Chinese sibling of Sliver and Cobalt Strike." "A fully functional version of the command-and-control (C2), written in Golang with a User Interface in Simplified Chinese, is freely available and can generate new implants with custom configurations with ease, increasing the likelihood of wider from The Hacker News https://ift.tt/y3Der4Y via IFTTT

New 'ParseThru' Parameter Smuggling Vulnerability Affects Golang-based Applications

Security researchers have discovered a new vulnerability called ParseThru affecting Golang-based applications that could be abused to gain unauthorized access to cloud-based applications. "The newly discovered vulnerability allows a threat actor to bypass validations under certain conditions, as a result of the use of unsafe URL parsing methods built in the language," Israeli cybersecurity firm from The Hacker News https://ift.tt/zYxqkeX via IFTTT

To uncover a deepfake video call, ask the caller to turn sideways

To uncover a deepfake video call, ask the caller to turn sideways 504 by Hard_Space | 189 comments on Hacker News.

New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains

A new botnet named Orchard has been observed using Bitcoin creator Satoshi Nakamoto's account transaction information to generate domain names to conceal its command-and-control (C2) infrastructure. "Because of the uncertainty of Bitcoin transactions, this technique is more unpredictable than using the common time-generated [domain generation algorithms], and thus more difficult to defend from The Hacker News https://ift.tt/tZdlVC7 via IFTTT

The Benefits of Building a Mature and Diverse Blue Team

A few days ago, a friend and I were having a rather engaging conversation that sparked my excitement. We were discussing my prospects of becoming a red teamer as a natural career progression. The reason I got stirred up is not that I want to change either my job or my position, as I am a happy camper being part of Cymulate's blue team. What upset me was that my friend could not grasp the idea from The Hacker News https://ift.tt/HrKLohA via IFTTT

Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore

A sophisticated scam-as-a-service operation dubbed Classiscam has now infiltrated into Singapore, more than 1.5 years after expanding to Europe. "Scammers posing as legitimate buyers approach sellers with the request to purchase goods from their listings and the ultimate aim of stealing payment data," Group-IB said in a report shared with The Hacker News. The cybersecurity firm called the from The Hacker News https://ift.tt/hxqYAky via IFTTT

Fake IMDB credits

Fake IMDB credits 483 by HelenePhisher | 207 comments on Hacker News.

Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook

Facebook parent company Meta disclosed that it took action against two espionage operations in South Asia that leveraged its social media platforms to distribute malware to potential targets. The first set of activities is what the company described as "persistent and well-resourced" and undertaken by a hacking group tracked under the moniker Bitter APT (aka APT-C-08 or T-APT-17) targeting from The Hacker News https://ift.tt/ZyGmtf9 via IFTTT

“Code” 2nd Edition Now Available

“Code” 2nd Edition Now Available 444 by ingve | 134 comments on Hacker News.

DreamWorks Animation to release MoonRay as open source

DreamWorks Animation to release MoonRay as open source 426 by mroche | 106 comments on Hacker News.

Amazon to acquire maker of Roomba vacuum for roughly $1.7B

Amazon to acquire maker of Roomba vacuum for roughly $1.7B 468 by mrkramer | 460 comments on Hacker News.

New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack

A new IoT botnet malware dubbed RapperBot has been observed rapidly evolving its capabilities since it was first discovered in mid-June 2022. "This family borrows heavily from the original Mirai source code, but what separates it from other IoT malware families is its built-in capability to brute force credentials and gain access to SSH servers instead of Telnet as implemented in Mirai," from The Hacker News https://ift.tt/60QimzI via IFTTT

Cramming 'Papers, Please' onto Phones

Cramming 'Papers, Please' onto Phones 520 by nycpig | 94 comments on Hacker News.

GraphQL kinda sucks

GraphQL kinda sucks 499 by randytandy | 326 comments on Hacker News. Graphql is great, but is totally over hyped. This is probably more of a rant or a frustrated dev outburst. but beginner to mid level developers are lead down the path of USE GRAPHQL especially on youtube... and this is just unfair and wrong. The good: - It makes working with describing the data you want easy - It can save you bandwidth. Get what you ask for and no more - It makes documentation for data consumers easy - It can make subscription easier for you to use - Can let you federate API calls The bad - It is actually a pain to use, depending on the backend you are using you'll have to manage two or more type systems if there are no code first generates in your language - It doesn't support map/tables/dictionaries. This is actually huge. I get that there might be some pattern where you don't want to allow this but for the majority of situations working with json api's you'll end up with a {[...

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

Twitter on Friday revealed that a now-patched zero-day bug was used to link phone numbers and emails to user accounts on the social media platform. "As a result of the vulnerability, if someone submitted an email address or phone number to Twitter's systems, Twitter's systems would tell the person what Twitter account the submitted email addresses or phone number was associated with, if any," from The Hacker News https://ift.tt/RI8aYzy via IFTTT

Slack Resets Passwords After a Bug Exposed Hashed Passwords for Some Users

Slack said it took the step of resetting passwords for about 0.5% of its users after a flaw exposed salted password hashes when creating or revoking shared invitation links for workspaces. "When a user performed either of these actions, Slack transmitted a hashed version of their password to other workspace members," the enterprise communication and collaboration platform said in an alert on 4th from The Hacker News https://ift.tt/foT1i2Z via IFTTT

Resolving Availability vs. Security, a Constant Conflict in IT

Conflicting business requirements is a common problem – and you find it in every corner of an organization, including in information technology. Resolving these conflicts is a must, but it isn’t always easy – though sometimes there is a novel solution that helps. In IT management there is a constant struggle between security and operations teams. Yes, both teams ultimately want to have secure from The Hacker News https://ift.tt/VAMcXei via IFTTT

A Growing Number of Malware Attacks Leveraging Dark Utilities 'C2-as-a-Service'

A nascent service called Dark Utilities has already attracted 3,000 users for its ability to provide command-and-control (C2) services with the goal of commandeering compromised systems. "It is marketed as a means to enable remote access, command execution, distributed denial-of-service (DDoS) attacks and cryptocurrency mining operations on infected systems," Cisco Talos said in a report shared from The Hacker News https://ift.tt/7aXouGm via IFTTT

We're improving search results when you use quotes

We're improving search results when you use quotes 429 by Kortaggio | 333 comments on Hacker News.

Tell HN: I interviewed my dad before he died

Tell HN: I interviewed my dad before he died 409 by loveudad | 110 comments on Hacker News. My dad got really sick a few months ago. I was shocked but also panicked about the idea of him dying without me knowing him well. He was a great dad but didn't talk much. Fortunately, he got better for a short time. I seized the opportunity to ask him as much as he could answer and film him. Of course, his memory wasn't perfect but I got the big picture. Now that he passed away, I'm both devastated and glad that I got to know him more and kept a record so I can see his face and listen to his voice for more than the usual family video. I wish I had done it sooner though. I've heard multiple people tell me they don't know their parents' or grandparents' life, or they've heard it but they've eventually forgotten so I thought I'd share. I hope this will help some of you. Thank you blood donors Thank you dad

CISA Adds Zimbra Email Vulnerability to its Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a recently disclosed high-severity vulnerability in the Zimbra email suite to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The issue in question is CVE-2022-27924 (CVSS score: 7.5), a command injection flaw in the platform that could lead to the execution of arbitrary from The Hacker News https://ift.tt/tKQsvOE via IFTTT

Hikaru Nakamura's Forbidden Platform

Hikaru Nakamura's Forbidden Platform 398 by jdthedisciple | 134 comments on Hacker News.

FauxPilot – an attempt to build a locally hosted version of GitHub Copilot

FauxPilot – an attempt to build a locally hosted version of GitHub Copilot 411 by fniephaus | 74 comments on Hacker News.

Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage

A threat actor is said to have "highly likely" exploited a security flaw in an outdated Atlassian Confluence server to deploy a never-before-seen backdoor against an unnamed organization in the research and technical services sector. The attack, which transpired over a seven-day-period during the end of May, has been attributed to a threat activity cluster tracked by cybersecurity firm Deepwatch from The Hacker News https://ift.tt/3lD4MVB via IFTTT

Three Common Mistakes That May Sabotage Your Security Training

Phishing incidents are on the rise. A report from IBM shows that phishing was the most popular attack vector in 2021, resulting in one in five employees falling victim to phishing hacking techniques. The Need for Security Awareness Training  Although technical solutions protect against phishing threats, no solution is 100% effective. Consequently, companies have no choice but to involve their from The Hacker News https://ift.tt/Z8kTVRO via IFTTT

Cisco Business Routers Found Vulnerable to Critical Remote Hacking Flaws

Cisco on Wednesday rolled out patches to address eight security vulnerabilities, three of which could be weaponized by an unauthenticated attacker to gain remote code execution (RCE) or cause a denial-of-service (DoS) condition on affected devices. The most critical of the flaws impact Cisco Small Business RV160, RV260, RV340, and RV345 Series routers. Tracked as CVE-2022-20842 (CVSS score: 9.8) from The Hacker News https://ift.tt/48A9pM6 via IFTTT

Productivity porn

Productivity porn 473 by triplechill | 272 comments on Hacker News.

MIT invents $4 solar desalination device

MIT invents $4 solar desalination device 435 by serverlessmom | 216 comments on Hacker News.

I still love PHP and JavaScript

I still love PHP and JavaScript 401 by larve | 375 comments on Hacker News.

DALL·E 2 prompt book [pdf]

DALL·E 2 prompt book [pdf] 424 by tomduncalf | 137 comments on Hacker News.

What’s going on with Google and Facebook hiring freezes?

What’s going on with Google and Facebook hiring freezes? 421 by leeny | 598 comments on Hacker News.

What’s the strangest thing you ever found in a book?

What’s the strangest thing you ever found in a book? 640 by ColinWright | 289 comments on Hacker News.

On-Demand Webinar: New CISO Survey Reveals Top Challenges for Small Cyber Security Teams

The only threat more persistent to organizations than cyber criminals? The cyber security skills crisis.  Nearly 60% of enterprises can’t find the staff to protect their data (and reputations!) from new and emerging breeds of cyber-attacks, reports the Information Systems Security Association (ISSA) in its 5th annual global industry study.  The result? Heavier workloads, unfilled positions, and from The Hacker News https://ift.tt/BX1uwpD via IFTTT

Researchers Warns of Large-Scale AiTM Attacks Targeting Enterprise Users

A new, large-scale phishing campaign has been observed using adversary-in-the-middle (AitM) techniques to get around security protections and compromise enterprise email accounts. "It uses an adversary-in-the-middle (AitM) attack technique capable of bypassing multi-factor authentication," Zscaler researchers Sudeep Singh and Jagadeeswar Ramanukolanu said in a Tuesday report. "The campaign is from The Hacker News https://ift.tt/9Q5X8qZ via IFTTT

Robinhood lays off 23% of staff

Robinhood lays off 23% of staff 581 by tempsy | 519 comments on Hacker News.

VMware Releases Patches for Several New Flaws Affecting Multiple Products

Virtualization services provider VMware on Tuesday shipped updates to address 10 security flaws affecting multiple products that could be abused by unauthenticated attackers to perform malicious actions. The issues tracked from CVE-2022-31656 through CVE-2022-31665 (CVSS scores: 4.7 - 9.8) affect the VMware Workspace ONE Access, Workspace ONE Access Connector, Identity Manager, Identity Manager from The Hacker News https://ift.tt/zItPTYn via IFTTT

I used DALL·E 2 to generate a logo

I used DALL·E 2 to generate a logo 579 by cube2222 | 243 comments on Hacker News.

Understanding Jane Street

Understanding Jane Street 551 by mxtihvb | 290 comments on Hacker News.

Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike

Researchers have disclosed a new offensive framework called Manjusaka that they call a "Chinese sibling of Sliver and Cobalt Strike." "A fully functional version of the command-and-control (C2), written in GoLang with a User Interface in Simplified Chinese, is freely available and can generate new implants with custom configurations with ease, increasing the likelihood of wider adoption of this from The Hacker News https://ift.tt/l58yJLd via IFTTT

New 'ParseThru' Parameter Smuggling Vulnerability Affects Golang-based Applications

Security researchers have discovered a new vulnerability called ParseThru affecting Golang-based applications that could be abused to gain unauthorized access to cloud-based applications. "The newly discovered vulnerability allows a threat actor to bypass validations under certain conditions, as a result of the use of unsafe URL parsing methods built in the language," Israeli cybersecurity firm from The Hacker News https://ift.tt/gERzPY7 via IFTTT

What is ransomware and how can you defend your business from it?

Ransomware is a kind of malware used by cybercriminals to stop users from accessing their systems or files; the cybercriminals then threaten to leak, destroy or withhold sensitive information unless a ransom is paid. Ransomware attacks can target either the data held on computer systems (known as locker ransomware) or devices (crypto-ransomware). In both instances, once a ransom is paid, threat from The Hacker News https://ift.tt/uUW0v1y via IFTTT

LockBit Ransomware Abuses Windows Defender to Deploy Cobalt Strike Payload

A threat actor associated with the LockBit 3.0 ransomware-as-a-service (RaaS) operation has been observed abusing the Windows Defender command-line tool to decrypt and load Cobalt Strike payloads.  According to a report published by SentinelOne last week, the incident occurred after obtaining initial access via the Log4Shell vulnerability against an unpatched VMware Horizon Server. "Once initial from The Hacker News https://ift.tt/M1Sab34 via IFTTT

How I regained concentration and focus

How I regained concentration and focus 540 by aiobe | 331 comments on Hacker News.

Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys

Researchers have uncovered a list of 3,207 apps, some of which can be utilized to gain unauthorized access to Twitter accounts. The takeover is made possible, thanks to a leak of legitimate Consumer Key and Consumer Secret information, respectively, Singapore-based cybersecurity firm CloudSEK said in a report exclusively shared with The Hacker News. "Out of 3,207, 230 apps are leaking all four from The Hacker News https://ift.tt/eJRKVEW via IFTTT

Two Key Ways Development Teams Can Increase Their Security Maturity

Now more than ever, organizations need to enable their development teams to build and grow their security skills. Today organizations face a threat landscape where individuals, well-financed syndicates, and state actors are actively trying to exploit errors in software. Yet, according to recent global research, 67% of developers that were interviewed said they were still shipping code they knew from The Hacker News https://ift.tt/pRWCNqK via IFTTT

Librarian's Letter to Google Security

Librarian's Letter to Google Security 636 by 2352500 | 193 comments on Hacker News.

Australian Hacker Charged with Creating, Selling Spyware to Cyber Criminals

A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use by domestic violence perpetrators and child sex offenders. Jacob Wayne John Keen, who currently resides at Frankston, Melbourne, is said to have created the remote access trojan (RAT) when he was 15, in addition to working as the administrator for the tool from 2013 until its from The Hacker News https://ift.tt/4VWNkEx via IFTTT