Posts

Showing posts from October, 2022

Tips for Choosing a Pentesting Company

In today's world of automated hacking systems, frequent data breaches and consumer protection regulations such as GDPR and PCI DSS, penetration testing is now an essential security requirement for organisations of all sizes. But what should you look for when choosing the right provider? The sheer number of providers can be daunting, and finding one which can deliver a high-quality test at a from The Hacker News https://ift.tt/O64e8E2 via IFTTT

Unofficial Patch Released for New Actively Exploited Windows MotW Vulnerability

An unofficial patch has been made available for an actively exploited security flaw in Microsoft Windows that makes it possible for files signed with malformed signatures to sneak past Mark-of-the-Web (MotW) protections. The fix, released by 0patch, arrives weeks after HP Wolf Security disclosed a Magniber ransomware campaign that targets users with fake security updates which employ a from The Hacker News https://ift.tt/ylPg3BE via IFTTT

GitHub Repojacking Bug Could've Allowed Attackers to Takeover Other Users' Repositories

Cloud-based repository hosting service GitHub has addressed a high-severity security flaw that could have been exploited to create malicious repositories and mount supply chain attacks. The RepoJacking technique, disclosed by Checkmarx, entails a bypass of a protection mechanism called popular repository namespace retirement, which aims to prevent developers from pulling unsafe repositories with from The Hacker News https://ift.tt/4ochWlV via IFTTT

Find your Twitter friends on Mastodon

Find your Twitter friends on Mastodon 505 by srvmshr | 306 comments on Hacker News.

SQLite in the browser with WASM/JS

SQLite in the browser with WASM/JS 536 by hochmartinez | 196 comments on Hacker News.

How to communicate effectively as a developer

How to communicate effectively as a developer 531 by karls | 210 comments on Hacker News.

Google Ad Disguising Itself as www.gimp.org

Google Ad Disguising Itself as www.gimp.org 575 by tosh | 208 comments on Hacker News.

How I make a living working on SerenityOS

How I make a living working on SerenityOS 547 by akling | 110 comments on Hacker News.

Kathleen Booth, the inventor of assembly language, has died

Kathleen Booth, the inventor of assembly language, has died 622 by sohkamyung | 94 comments on Hacker News.

Twilio Reveals Another Breach from the Same Hackers Behind the August Hack

Communication services provider Twilio this week disclosed that it experienced another "brief security incident" in June 2022 perpetrated by the same threat actor behind the August hack that resulted in unauthorized access of customer information. The security event occurred on June 29, 2022, the company said in an updated advisory shared this week, as part of its probe into the digital break-in from The Hacker News https://ift.tt/RbQ31pY via IFTTT

Disabling the Intel Management Engine

Disabling the Intel Management Engine 521 by metadat | 289 comments on Hacker News.

Show HN: SadServers – Test your Linux troubleshooting skills

Show HN: SadServers – Test your Linux troubleshooting skills 579 by fduran | 128 comments on Hacker News. Hello, I'm building SadServers.com, a SaaS where users can test their Linux troubleshooting skills on real Linux servers in a "Capture the Flag" fashion. I hope this is useful, to learn more about the project please see https://ift.tt/sbyiSqY

Cloud Security Made Simple in New Guidebook For Lean Teams

Cloud computing was the lifeline that kept many companies running during the pandemic. But it was a classic case of medicine that comes with serious side effects.  Having anywhere, anytime access to data and apps gives companies tremendous flexibility in a fast-changing world, plus the means to scale and customize IT at will. The cloud is an asset or upgrade in almost every way. With one glaring from The Hacker News https://ift.tt/DKrQelh via IFTTT

These Dropper Apps On Play Store Targeting Over 200 Banking and Cryptocurrency Wallets

Five malicious dropper Android apps with over 130,000 cumulative installations have been discovered on the Google Play Store distributing banking trojans like SharkBot and Vultur, which are capable of stealing financial data and performing on-device fraud. "These droppers continue the unstopping evolution of malicious apps sneaking to the official store," Dutch mobile security firm ThreatFabric from The Hacker News https://ift.tt/bGpYIDh via IFTTT

Raspberry Robin Operators Selling Cybercriminals Access to Thousands of Endpoints

The Raspberry Robin worm is becoming an access-as-a-service malware for deploying other payloads, including IcedID, Bumblebee, TrueBot (aka Silence), and Clop ransomware. It is "part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread," the Microsoft Security Threat Intelligence Center (MSTIC from The Hacker News https://ift.tt/NAhClip via IFTTT

Pokemon Card Animation

Pokemon Card Animation 712 by parrot987 | 94 comments on Hacker News.

British Hacker Charged for Operating "The Real Deal" Dark Web Marketplace

A 34-year-old U.K. national has been arraigned in the U.S. for operating a dark web marketplace called The Real Deal that specialized in the sales of hacking tools and stolen login credentials. Daniel Kaye, who went by a litany of pseudonyms Popopret, Bestbuy, UserL0ser, and Spdrman, has been charged with five counts of access device fraud and one count of money laundering conspiracy. Kaye was from The Hacker News https://ift.tt/bM0dk6v via IFTTT

Researchers Expose Over 80 ShadowPad Malware C2 Servers

As many as 85 command-and-control (C2) servers have been discovered supported by the ShadowPad malware since September 2021, with infrastructure detected as recently as October 16, 2022. That's according to VMware's Threat Analysis Unit (TAU), which studied three ShadowPad variants using TCP, UDP, and HTTP(S) protocols for C2 communications. ShadowPad, seen as a successor to PlugX, is a modular from The Hacker News https://ift.tt/ew5PZW4 via IFTTT

Ransomware: Open Source to the Rescue

Automobile, Energy, Media, Ransomware?When thinking about verticals, one may not instantly think of cyber-criminality. Yet, every move made by governments, clients, and private contractors screams toward normalizing those menaces as a new vertical. Ransomware has every trait of the classical economical vertical. A thriving ecosystem of insurers, negotiators, software providers, and managed from The Hacker News https://ift.tt/NgGc1Jx via IFTTT

Apple iOS and macOS Flaw Could've Let Apps Eavesdrop on Your Conversations with Siri

A now-patched security flaw in Apple's iOS and macOS operating systems could have potentially enabled apps with Bluetooth access to eavesdrop on conversations with Siri. Apple said "an app may be able to record audio using a pair of connected AirPods," adding it addressed the Core Bluetooth issue in iOS 16.1 with improved entitlements. Credited with discovering and reporting the bug in August from The Hacker News https://ift.tt/nLZpoCI via IFTTT

New Cryptojacking Campaign Targeting Vulnerable Docker and Kubernetes Instances

A new cryptojacking campaign has been uncovered targeting vulnerable Docker and Kubernetes infrastructures as part of opportunistic attacks designed to illicitly mine cryptocurrency. Cybersecurity company CrowdStrike dubbed the activity Kiss-a-dog, with its command-and-control infrastructure overlapping with those associated with other groups like TeamTNT, which are known to strike misconfigured from The Hacker News https://ift.tt/jIXLxDc via IFTTT

I Fell 15,000 Feet and Lived (2009)

I Fell 15,000 Feet and Lived (2009) 621 by metadat | 244 comments on Hacker News.

This 9-Course Bundle Can Take Your Cybersecurity Skills to the Next Level

If you regularly read The Hacker News, there’s a fair chance that you know something about cybersecurity. It’s possible to turn that interest into a six-figure career. But to make the leap, you need to pick up some key skills and professional certifications. Featuring nine in-depth courses, The 2022 Masters in Cyber Security Certification Bundle helps you get ready for the next step. And in a from The Hacker News https://ift.tt/Nkv0URH via IFTTT

Kimsuky Hackers Spotted Using 3 New Android Malware to Target South Koreans

The North Korean espionage-focused actor known as Kimsuky has been observed using three different Android malware strains to target users located in its southern counterpart. That's according to findings from South Korean cybersecurity company S2W, which named the malware families FastFire, FastViewer, and FastSpy. "The FastFire malware is disguised as a Google security plugin, and the from The Hacker News https://ift.tt/40dP3kx via IFTTT

Unknown Actors are Deploying RomCom RAT to Target Ukrainian Military

The threat actor behind a remote access trojan called RomCom RAT has been observed targeting Ukrainian military institutions as part of a new spear-phishing campaign that commenced on October 21, 2022.  The development marks a shift in the attacker's modus operandi, which has been previously attributed to spoofing legitimate apps like Advanced IP Scanner and pdfFiller to drop backdoors on from The Hacker News https://ift.tt/DTmnBAk via IFTTT

Turbopack, the successor to Webpack

Turbopack, the successor to Webpack 599 by nutlope | 286 comments on Hacker News.

Hackers Actively Exploiting Cisco AnyConnect and GIGABYTE Drivers Vulnerabilities

Cisco has warned of active exploitation attempts targeting a pair of two-year-old security flaws in the Cisco AnyConnect Secure Mobility Client for Windows. Tracked as CVE-2020-3153 (CVSS score: 6.5) and CVE-2020-3433 (CVSS score: 7.8), the vulnerabilities could enable local authenticated attackers to perform DLL hijacking and copy arbitrary files to system directories with elevated privileges. from The Hacker News https://ift.tt/qm8HI1T via IFTTT

VMware Releases Patch for Critical RCE Flaw in Cloud Foundation Platform

VMware on Tuesday shipped security updates to address a critical security flaw in its VMware Cloud Foundation product. Tracked as CVE-2021-39144, the issue has been rated 9.8 out of 10 on the CVSS vulnerability scoring system, and relates to a remote code execution vulnerability via XStream open source library. "Due to an unauthenticated endpoint that leverages XStream for input serialization in from The Hacker News https://ift.tt/zpjJgQA via IFTTT

My dad's resume and skills from 1980

My dad's resume and skills from 1980 629 by metadat | 304 comments on Hacker News.

What “work” looks like

What “work” looks like 535 by LordNibbler | 146 comments on Hacker News.

Researchers Detail Windows Event Log Vulnerabilities: LogCrusher and OverLog

Cybersecurity researchers have disclosed details about a pair of vulnerabilities in Microsoft Windows, one of which could be exploited to result in a denial-of-service (DoS). The exploits, dubbed LogCrusher and OverLog by Varonis, take aim at the EventLog Remoting Protocol (MS-EVEN), which enables remote access to event logs. While the former allows "any domain user to remotely from The Hacker News https://ift.tt/tbscJv7 via IFTTT

Cybercriminals Used Two PoS Malware to Steal Details of Over 167,000 Credit Cards

Two point-of-sale (PoS) malware variants have been put to use by a threat actor to steal information related to more than 167,000 credit cards from payment terminals. According to Singapore-headquartered cybersecurity company Group-IB, the stolen data dumps could net the operators as much as $3.34 million by selling them on underground forums. While a significant proportion of attacks aimed at from The Hacker News https://ift.tt/D0szEYL via IFTTT

Apple Releases Patch for New Actively Exploited iOS and iPadOS Zero-Day Vulnerability

Tech giant Apple on Monday rolled out updates to remediate a zero-day flaw in iOS and iPadOS that it said has been actively exploited in the wild. The weakness, given the identifier CVE-2022-42827, has been described as an out-of-bounds write issue in the Kernel, which could be abused by a rogue application to execute arbitrary code with the highest privileges. Successful exploitation of from The Hacker News https://ift.tt/fFSWoVe via IFTTT

Sonic: Fast, lightweight and schema-less search backend

Sonic: Fast, lightweight and schema-less search backend 497 by rcarmo | 145 comments on Hacker News.

I help seniors with technology issues. A regular came in with a Lenovo laptop

I help seniors with technology issues. A regular came in with a Lenovo laptop 522 by thinkingemote | 367 comments on Hacker News.

Fake Books

Fake Books 456 by tybulewicz | 167 comments on Hacker News.

Stop Scanning Me

Stop Scanning Me 492 by favourable | 134 comments on Hacker News.

CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware

U.S. cybersecurity and intelligence agencies have published a joint advisory warning of attacks perpetrated by a cybercrime gang known as the Daixin Team primarily targeting the healthcare sector in the country. "The Daixin Team is a ransomware and data extortion group that has targeted the HPH Sector with ransomware and data extortion operations since at least June 2022," the agencies said. The from The Hacker News https://ift.tt/utCNipw via IFTTT

Five origami books by Shuzo Fujimoto are now public domain

Five origami books by Shuzo Fujimoto are now public domain 544 by mkosmul | 35 comments on Hacker News.

Why Ransomware in Education on the Rise and What That Means for 2023

The breach of LA Unified School District (LAUSD) highlights the prevalence of password vulnerabilities, as criminal hackers continue to use breached credentials in increasingly frequent ransomware attacks on education. The Labor Day weekend breach of LAUSD brought significant districtwide disruptions to access to email, computers, and applications. It's unclear what student or employee data the from The Hacker News https://ift.tt/A6ujk5N via IFTTT

A chill driving game with procedurally generate scenic landscapes

A chill driving game with procedurally generate scenic landscapes 537 by itsuka | 155 comments on Hacker News.

Emotet Botnet Distributing Self-Unlocking Password-Protected RAR Files to Drop Malware

The notorious Emotet botnet has been linked to a new wave of malspam campaigns that take advantage of password-protected archive files to drop CoinMiner and Quasar RAT on compromised systems. In an attack chain detected by Trustwave SpiderLabs researchers, an invoice-themed ZIP file lure was found to contain a nested self-extracting (SFX) archive, the first archive acting as a conduit to launch from The Hacker News https://ift.tt/NCFq4Rr via IFTTT

Multiple Campaigns Exploit VMware Vulnerability to Deploy Crypto Miners and Ransomware

A now-patched vulnerability in VMware Workspace ONE Access has been observed being exploited to deliver both cryptocurrency miners and ransomware on affected machines. "The attacker intends to utilize a victim's resources as much as possible, not only to install RAR1Ransom for extortion, but also to spread GuardMiner to collect cryptocurrency," Fortinet FortiGuard Labs researcher Cara Lin said  from The Hacker News https://ift.tt/PnpkHUf via IFTTT

How to use a watch as a compass

How to use a watch as a compass 471 by jamesgill | 143 comments on Hacker News.

Google is forcing us to make our open source VoIP app worse

Google is forcing us to make our open source VoIP app worse 545 by DevhouseSpindle | 250 comments on Hacker News.

Hackers Started Exploiting Critical "Text4Shell" Apache Commons Text Vulnerability

WordPress security company Wordfence on Thursday said it started detecting exploitation attempts targeting the newly disclosed flaw in Apache Commons Text on October 18, 2022. The vulnerability, tracked as CVE-2022-42889 aka Text4Shell, has been assigned a severity ranking of 9.8 out of a possible 10.0 on the CVSS scale and affects versions 1.5 through 1.9 of the library. It's also similar to from The Hacker News https://ift.tt/49aYOXd via IFTTT

A Quick Look at the "Strengthening America's Cybersecurity" Initiative

Acknowledging that you have a problem is the first step to addressing the problem in a serious way. This seems to be the reasoning for the White House recently announcing its "Strengthening America's Cybersecurity" initiative. The text of the announcement contains several statements that anyone who's ever read about cybersecurity will have heard many times over: increasing resilience, greater from The Hacker News https://ift.tt/JCrVXke via IFTTT

Microsoft Confirms Server Misconfiguration Led to 65,000+ Companies' Data Leak

Microsoft this week confirmed that it inadvertently exposed information related to thousands of customers following a security lapse that left an endpoint publicly accessible over the internet sans any authentication. "This misconfiguration resulted in the potential for unauthenticated access to some business transaction data corresponding to interactions between Microsoft and prospective from The Hacker News https://ift.tt/h2C7up9 via IFTTT

Brazilian Police Arrest Suspected Member of Lapsus$ Hacking Group

The Federal Police of Brazil on Wednesday announced it had arrested an individual for purported links to the notorious LAPSUS$ extortionist gang. The arrest was made as part of a new law enforcement effort, dubbed Operation Dark Cloud, that was launched in August 2022, the agency noted. Not much is known about the suspect other than the fact that the person could be a teenager. The Polícia from The Hacker News https://ift.tt/BaAme7o via IFTTT

NASA’s Webb takes star-filled portrait of Pillars of Creation

NASA’s Webb takes star-filled portrait of Pillars of Creation 492 by pizza | 129 comments on Hacker News.

Brave browser now blocks cookie banners

Brave browser now blocks cookie banners 484 by bookofjoe | 520 comments on Hacker News.

Show HN: A new search engine UX I've been working on in my free time

Show HN: A new search engine UX I've been working on in my free time 497 by ryes | 286 comments on Hacker News.

I am endlessly fascinated with content tagging systems

I am endlessly fascinated with content tagging systems 568 by redbar0n | 259 comments on Hacker News.

American Airlines is trying to stop a popular app used by flight attendants

American Airlines is trying to stop a popular app used by flight attendants 496 by josephcsible | 247 comments on Hacker News.

Never trust a system that seems to be working

Never trust a system that seems to be working 493 by pkilgore | 320 comments on Hacker News.

75% of the time we spend with our kids in our lifetime will be spent by age 12

75% of the time we spend with our kids in our lifetime will be spent by age 12 565 by gmays | 430 comments on Hacker News.

Researchers Detail Azure SFX Flaw That Could've Allowed Attackers to Gain Admin Access

Cybersecurity researchers have shared more details about a now-patched security flaw in Azure Service Fabric Explorer (SFX) that could potentially enable an attacker to gain administrator privileges on the cluster. The vulnerability, tracked as CVE-2022-35829, carries a CVSS severity rating of 6.2 and was addressed by Microsoft as part of its Patch Tuesday updates last week. Orca from The Hacker News https://ift.tt/mzdSxfv via IFTTT

A Quick Guide for Small Cybersecurity Teams Looking to Invest in Cyber Insurance

In the world of insurance providers and policies, cyber insurance is a fairly new field. And many security teams are trying to wrap their heads around it.  What is it and do they need it? And with what time will they spend researching how to integrate cyber insurance into their strategy?  For small security teams, this is particularly challenging as they contend with limited resources. Luckily, from The Hacker News https://ift.tt/MvGWVx3 via IFTTT

Experts Warn of Stealthy PowerShell Backdoor Disguising as Windows Update

Details have emerged about a previously undocumented and fully undetectable (FUD) PowerShell backdoor that gains its stealth by disguising itself as part of a Windows update process. "The covert self-developed tool and the associated C2 commands seem to be the work of a sophisticated, unknown threat actor who has targeted approximately 100 victims," Tomer Bar, director of security research at from The Hacker News https://ift.tt/HlxBubF via IFTTT

CISA Warns of Critical Flaws Affecting Industrial Appliances from Advantech and Hitachi

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released two Industrial Control Systems (ICS) advisories pertaining to severe flaws in Advantech R-SeeNet and Hitachi Energy APM Edge appliances. This consists of three weaknesses in the R-SeeNet monitoring solution, successful exploitation of which "could result in an unauthorized attacker remotely deleting files on the from The Hacker News https://ift.tt/mpy8gST via IFTTT

How to become a pirate archivist

How to become a pirate archivist 538 by pilimi_anna | 95 comments on Hacker News.

Sound

Sound 689 by todsacerdoti | 54 comments on Hacker News.

Сryptocurrency and Ransomware — The Ultimate Friendship

Both cryptocurrency and ransomware are nothing new in the digital world; both have been there for a very long time, which was enough for them to find common pieces for starting their relationship. Ransomware can be like a virtual car that works on all types of fuels, and crypto is the one that is currently most recommended. No one can argue that 2020 was the year of ransomware in the cyber world from The Hacker News https://ift.tt/Ybiq0gt via IFTTT

Chinese 'Spyder Loader' Malware Spotted Targeting Organizations in Hong Kong

The China-aligned espionage-focused actor dubbed Winnti has set its sights on government organizations in Hong Kong as part of an ongoing campaign dubbed Operation CuckooBees. Active since at least 2007, Winnti (aka APT41, Barium, Bronze Atlas, and Wicked Panda) is the name designated to a prolific cyber threat group that carries out Chinese state-sponsored espionage activity, predominantly from The Hacker News https://ift.tt/FiaLsJ7 via IFTTT

European Police Arrest a Gang That Hacked Wireless Key Fobs to Steal Cars

Law enforcement authorities in France, in collaboration with Spain and Latvia, have disrupted a cybercrime ring that leveraged a hacking tool to steal cars without having to use a physical key fob. "The criminals targeted vehicles with keyless entry and start systems, exploiting the technology to get into the car and drive away," Europol said in a press statement. The coordinated from The Hacker News https://ift.tt/f0mHVhq via IFTTT

Critical RCE Vulnerability Discovered in Popular Cobalt Strike Hacking Software

HelpSystems, the company behind the Cobalt Strike software platform, has released an out-of-band security update to address a remote code execution vulnerability that could allow an attacker to take control of targeted systems. Cobalt Strike is a commercial red-team framework that's mainly used for adversary simulation, but cracked versions of the software have been actively abused by ransomware from The Hacker News https://ift.tt/IlvJxCY via IFTTT

The Chaostron: An Important Advance in Learning Machines (1961)

The Chaostron: An Important Advance in Learning Machines (1961) 1061 by abrax3141 | 5 comments on Hacker News.

GitHub Copi­lot inves­ti­ga­tion

GitHub Copi­lot inves­ti­ga­tion 510 by john-doe | 416 comments on Hacker News.

New Prestige Ransomware Targeting Polish and Ukrainian Organizations

A new ransomware campaign targeted the transportation and logistics sectors in Ukraine and Poland on October 11 with a previously unknown payload dubbed Prestige. "The activity shares victimology with recent Russian state-aligned activity, specifically on affected geographies and countries, and overlaps with previous victims of the FoxBlade malware (also known as HermeticWiper)," the Microsoft from The Hacker News https://ift.tt/8je4Etm via IFTTT

Zimbra Releases Patch for Actively Exploited Vulnerability in its Collaboration Suite

Zimbra has released patches to contain an actively exploited security flaw in its enterprise collaboration suite that could be leveraged to upload arbitrary files to vulnerable instances. Tracked as CVE-2022-41352 (CVSS score: 9.8), the issue affects a component of the Zimbra suite called Amavis, an open source content filter, and more specifically, the cpio utility it uses to scan and extract from The Hacker News https://ift.tt/wOVtK9U via IFTTT

Alaska snow crab season canceled after disappearance of an estimated 1B crabs

Alaska snow crab season canceled after disappearance of an estimated 1B crabs 528 by ijidak | 391 comments on Hacker News.

GitHub Copilot, with “public code” blocked, emits my copyrighted code

GitHub Copilot, with “public code” blocked, emits my copyrighted code 540 by davidgerard | 429 comments on Hacker News.

INTERPOL-led Operation Takes Down 'Black Axe' Cyber Crime Organization

The International Criminal Police Organization, also called the Interpol, has announced the arrests of 75 individuals as part of a coordinated global operation against an organized cybercrime syndicate called Black Axe. "'Black Axe' and other West African organized crime groups have developed transnational networks, defrauding victims of millions while channeling their profits into lavish from The Hacker News https://ift.tt/d0kAuYM via IFTTT

Show HN: America – Road Trip Simulator

Show HN: America – Road Trip Simulator 538 by 0x389 | 156 comments on Hacker News. APIs are a little like the open road—always waiting, full of opportunity, but hardly utilized. So here’s America, composed of several APIs that paint a vivid, real-time picture of a good old-fashioned road trip. Get local classifieds and photos. Tune into local radio stations. Talk wit other drivers. And more. Exploring the country by car was an invaluable experience for me during my time in the states. I’ve since moved to Barcelona, and find myself missing the territory. This is my attempt at recreating the magic.

Indian Energy Company Tata Power's IT Infrastructure Hit By Cyber Attack

Tata Power Company Limited, India's largest integrated power company, on Friday confirmed it was targeted by a cyberattack. The intrusion on IT infrastructure impacted "some of its IT systems," the company said in a filing with the National Stock Exchange (NSE) of India. It further said it has taken steps to retrieve and restore the affected machines, adding it put in place from The Hacker News https://ift.tt/EoF3en8 via IFTTT

Low Earth Orbit Visualization

Low Earth Orbit Visualization 530 by aseidl | 146 comments on Hacker News.

Researchers Reveal Detail for Windows Zero-Day Vulnerability Patched Last Month

Details have emerged about a now-patched security flaw in Windows Common Log File System (CLFS) that could be exploited by an attacker to gain elevated permissions on compromised machines. Tracked as CVE-2022-37969 (CVSS score: 7.8), the issue was addressed by Microsoft as part of its Patch Tuesday updates for September 2022, while also noting that it was being actively exploited in the wild. " from The Hacker News https://ift.tt/L67xnzX via IFTTT

How To Build a Career as a Freelance Cybersecurity Analyst — From Scratch

With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity analysts some of the most sought-after technology professionals in the world. And there are nowhere near enough of them to meet the demand. At last count, there were over 3.5 million unfilled cybersecurity jobs worldwide — and that number is still growing. The situation means that from The Hacker News https://ift.tt/PJ8Vous via IFTTT

TikTok profits from livestreams of families begging

TikTok profits from livestreams of families begging 488 by DocFeind | 283 comments on Hacker News.

Using a framework will harm the maintenance of your software

Using a framework will harm the maintenance of your software 452 by excerionsforte | 496 comments on Hacker News.

MAR1D: First-Person Mario

MAR1D: First-Person Mario 518 by rendaw | 153 comments on Hacker News.

How Brian Eno Created Ambient 1: Music for Airports

How Brian Eno Created Ambient 1: Music for Airports 503 by jim-jim-jim | 125 comments on Hacker News.

PostgreSQL 15

PostgreSQL 15 544 by jkatz05 | 107 comments on Hacker News.

Show HN: Obsidian 1.0 – Personal knowledge base app

Show HN: Obsidian 1.0 – Personal knowledge base app 569 by ericax | 294 comments on Hacker News. Cofounder of Obsidian here. We're excited to announce Obsidian 1.0 is live! Obsidian 1.0 introduces two big changes: a UI overhaul and an new tabbed interface. We've put a lot of care into making the app more approachable and more accessible. We've also prioritized using more native OS features for menus, windows, and many details. We got our first private beta users from a comment under a HN thread about org-roam [1], and our waiting list was an innocent Google Form. Good times! Our initial launch on HN was over two years ago [2], when terms like "second brain" and "tools for thought" were still in their infancy. Since then, the landscape has continued to evolve and new ideas are sprouting in the space every day. Obsidian has always embraced its "hacker" nature and thrives off its community of tinkerers. We now have over 670 plugins that push th...

Does the OWASP Top 10 Still Matter?

What is the OWASP Top 10, and – just as important – what is it not? In this review, we look at how you can make this critical risk report work for you and your organisation. What is OWASP? OWASP is the Open Web Application Security Project, an international non-profit organization dedicated to improving web application security.  It operates on the core principle that all of its materials are from The Hacker News https://ift.tt/DKqsTHc via IFTTT

Budworm Hackers Resurface with New Espionage Attacks Aimed at U.S. Organization

An advanced persistent threat (APT) actor known as Budworm targeted a U.S.-based entity for the first time in more than six years, according to latest research. The attack was aimed at an unnamed U.S. state legislature, the Symantec Threat Hunter team, part of Broadcom Software, said in a report shared with The Hacker News. Other intrusions mounted over the past six months were directed against from The Hacker News https://ift.tt/XgDusUh via IFTTT

Modified WhatsApp App Caught Infecting Android Devices with Malware

An unofficial version of the popular WhatsApp messaging app called YoWhatsApp has been observed deploying an Android trojan known as Triada. The goal of the malware is to steal the keys that "allow the use of a WhatsApp account without the app," Kaspersky said in a new report. "If the keys are stolen, a user of a malicious WhatsApp mod can lose control over their account." from The Hacker News https://ift.tt/QZL56Ep via IFTTT

Researchers Uncover Custom Backdoors and Spying Tools Used by Polonium Hackers

A threat actor tracked as Polonium has been linked to over a dozen highly targeted attacks aimed at Israelian entities with seven different custom backdoors since at least September 2021. The intrusions were aimed at organizations in various verticals, such as engineering, information technology, law, communications, branding and marketing, media, insurance, and social services, cybersecurity from The Hacker News https://ift.tt/wLTAHbN via IFTTT

Removing SMS support from Signal Android (soon)

Removing SMS support from Signal Android (soon) 490 by Aissen | 515 comments on Hacker News.

Critical Bug in Siemens SIMATIC PLCs Could Let Attackers Steal Cryptographic Keys

A vulnerability in Siemens Simatic programmable logic controller (PLC) can be exploited to retrieve the hard-coded, global private cryptographic keys and seize control of the devices. "An attacker can use these keys to perform multiple advanced attacks against Siemens SIMATIC devices and the related TIA Portal, while bypassing all four of its access level protections," industrial cybersecurity from The Hacker News https://ift.tt/gKNW1R3 via IFTTT

Meta Quest Pro

Meta Quest Pro 447 by mfiguiere | 730 comments on Hacker News.

I wish my web server were in the corner of my room

I wish my web server were in the corner of my room 439 by flobosg | 330 comments on Hacker News.

Joe Rogan Interviews Steve Jobs

Joe Rogan Interviews Steve Jobs 418 by charlieirish | 244 comments on Hacker News.

Go: Redefining For Loop Variable Semantics

Go: Redefining For Loop Variable Semantics 419 by denysvitali | 217 comments on Hacker News.

Leap: Neovim’s Answer to the Mouse

Leap: Neovim’s Answer to the Mouse 597 by bpierre | 251 comments on Hacker News.

BazarCall Callback Phishing Attacks Constantly Evolving Its Social Engineering Tactics

The operators behind the BazaCall call back phishing method have continued to evolve with updated social engineering tactics to deploy malware on targeted networks. The scheme eventually acts as an entry point to conduct financial fraud or the delivery of next-stage payloads such as ransomware, cybersecurity company Trellix said in a report published last week. Primary targets of the latest from The Hacker News https://ift.tt/5dS6kEF via IFTTT

Researchers Warn of New Phishing-as-a-Service Being Used by Cyber Criminals

Cyber criminals are using a previously undocumented phishing-as-a-service (PhaaS) toolkit called Caffeine to effectively scale up their attacks and distribute nefarious payloads. "This platform has an intuitive interface and comes at a relatively low cost while providing a multitude of features and tools to its criminal clients to orchestrate and automate core elements of their phishing from The Hacker News https://ift.tt/56K1aGy via IFTTT

Fortinet Warns of Active Exploitation of Newly Discovered Critical Auth Bypass Bug

Fortinet on Monday revealed that the newly patched critical security vulnerability impacting its firewall and proxy products is being actively exploited in the wild. Tracked as CVE-2022-40684 (CVSS score: 9.6), the flaw relates to an authentication bypass in FortiOS, FortiProxy, and FortiSwitchManager that could allow a remote attacker to perform unauthorized operations on the administrative from The Hacker News https://ift.tt/YMwLdb3 via IFTTT

Researchers Detail Malicious Tools Used by Cyberespionage Group Earth Aughisky

A new piece of research has detailed the increasingly sophisticated nature of the malware toolset employed by an advanced persistent threat (APT) group named Earth Aughisky. "Over the last decade, the group has continued to make adjustments in the tools and malware deployments on specific targets located in Taiwan and, more recently, Japan," Trend Micro disclosed in a technical profile last week from The Hacker News https://ift.tt/RSstQ95 via IFTTT

New Report Uncovers Emotet's Delivery and Evasion Techniques Used in Recent Attacks

Threat actors associated with the notorious Emotet malware are continually shifting their tactics and command-and-control (C2) infrastructure to escape detection, according to new research from VMware. Emotet is the work of a threat actor tracked as Mummy Spider (aka TA542), emerging in June 2014 as a banking trojan before morphing into an all-purpose loader in 2016 that's capable of delivering from The Hacker News https://ift.tt/F0mGvpu via IFTTT

Hackers Steal $100 Million Cryptocurrency from Binance Bridge

BNB Chain, a blockchain linked to the Binance cryptocurrency exchange, disclosed an exploit on a cross-chain bridge that drained around $100 million in digital assets. "There was an exploit affecting the native cross-chain bridge between BNB Beacon Chain (BEP2) and BNB Smart Chain (BEP20 or BSC), known as 'BSC Token Hub,'" it said last week. "The exploit was through a sophisticated forging of from The Hacker News https://ift.tt/29Dfv7r via IFTTT

Hackers Exploiting Unpatched RCE Flaw in Zimbra Collaboration Suite

A severe remote code execution vulnerability in Zimbra's enterprise collaboration software and email platform is being actively exploited, with no patch currently available to remediate the issue. The shortcoming, assigned CVE-2022-41352, carries a critical-severity rating of CVSS 9.8, providing a pathway for attackers to upload arbitrary files and carry out malicious actions on affected from The Hacker News https://ift.tt/WvxtIME via IFTTT

Microsoft Issues Improved Mitigations for Unpatched Exchange Server Vulnerabilities

Microsoft on Friday disclosed it has made more improvements to the mitigation method offered as a means to prevent exploitation attempts against the newly disclosed unpatched security flaws in Exchange Server. To that end, the tech giant has revised the blocking rule in IIS Manager from ".*autodiscover\.json.*Powershell.*" to "(?=.*autodiscover\.json)(?=.*powershell)." The list of from The Hacker News https://ift.tt/aMteRsu via IFTTT

Gmail 2FA causes the homeless to permanently lose access 3 times a year

Gmail 2FA causes the homeless to permanently lose access 3 times a year 787 by horseAMcharlie | 656 comments on Hacker News.

Fortinet Warns of New Auth Bypass Flaw Affecting FortiGate and FortiProxy

Fortinet has privately warned its customers of a security flaw affecting FortiGate firewalls and FortiProxy web proxies that could potentially allow an attacker to perform unauthorized actions on susceptible devices. Tracked as CVE-2022-40684, the high-severity flaw relates to an authentication bypass vulnerability that could permit an unauthenticated adversary to perform arbitrary operations on from The Hacker News https://ift.tt/TQAhxoN via IFTTT

Facebook Detects 400 Android and iOS Apps Stealing Users Log-in Credentials

Meta Platforms on Friday disclosed that it had identified over 400 malicious apps on Android and iOS that it said targeted online users with the goal of stealing their Facebook login information. "These apps were listed on the Google Play Store and Apple's App Store and disguised as photo editors, games, VPN services, business apps, and other utilities to trick people into downloading them," the from The Hacker News https://ift.tt/nrUIgVx via IFTTT

The essentials of GRC and cybersecurity — How they empower each other

Understanding the connection between GRC and cybersecurity When talking about cybersecurity, Governance, Risk, and Compliance (GRC) is often considered the least exciting part of business protection. However, its importance can't be ignored, and this is why.  While cybersecurity focuses on the technical side of protecting systems, networks, devices, and data, GRC is the tool that will help the from The Hacker News https://ift.tt/YUs02Hh via IFTTT

LofyGang Distributed ~200 Malicious NPM Packages to Steal Credit Card Data

Multiple campaigns that distributed trojanized and typosquatted packages on the NPM open source repository have been identified as the work of a single threat actor dubbed LofyGang. Checkmarx said it discovered 199 rogue packages totaling thousands of installations, with the group operating for over a year with the goal of stealing credit card data as well as user accounts associated with from The Hacker News https://ift.tt/zeiKdnl via IFTTT

Hackers Can Use 'App Mode' in Chromium Browsers' for Stealth Phishing Attacks

In what's a new phishing technique, it has been demonstrated that the Application Mode feature in Chromium-based web browsers can be abused to create "realistic desktop phishing applications." Application Mode is designed to offer native-like experiences in a manner that causes the website to be launched in a separate browser window, while also displaying the website's favicon and hiding the from The Hacker News https://ift.tt/TtGY8iL via IFTTT

BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions

In yet another case of bring your own vulnerable driver (BYOVD) attack, the operators of the BlackByte ransomware are leveraging a flaw in a legitimate Windows driver to bypass security solutions. "The evasion technique supports disabling a whopping list of over 1,000 drivers on which security products rely to provide protection," Sophos threat researcher Andreas Klopsch said in a new technical from The Hacker News https://ift.tt/52EA4kV via IFTTT

Eternity Group Hackers Offering New LilithBot Malware as a Service to Cybercriminals

The threat actor behind the malware-as-a-service (MaaS) called Eternity has been linked to new piece of malware called LilithBot. "It has advanced capabilities to be used as a miner, stealer, and a clipper along with its persistence mechanisms," Zscaler ThreatLabz researchers Shatak Jain and Aditya Sharma said in a Wednesday report. "The group has been continuously enhancing the malware, adding from The Hacker News https://ift.tt/tV0a3X5 via IFTTT

Details Released for Recently Patched new macOS Archive Utility Vulnerability

Security researchers have shared details about a now-addressed security flaw in Apple's macOS operating system that could be potentially exploited to run malicious applications in a manner that can bypass Apple's security measures. The vulnerability, tracked as CVE-2022-32910, is rooted in the built-in Archive Utility and "could lead to the execution of an unsigned and unnotarized application from The Hacker News https://ift.tt/WJTMXL0 via IFTTT

The Ultimate SaaS Security Posture Management Checklist, 2023 Edition

It's been a year since the release of The Ultimate SaaS Security Posture Management (SSPM) Checklist. If SSPM is on your radar, here's the 2023 checklist edition, which covers the critical features and capabilities when evaluating a solution. The ease with which SaaS apps can be deployed and adopted today is remarkable, but it has become a double-edged sword. On the one hand, apps are quickly from The Hacker News https://ift.tt/jcRI3TJ via IFTTT

Imagen Video: high definition video generation with diffusion models

Imagen Video: high definition video generation with diffusion models 757 by jasondavies | 456 comments on Hacker News.

Former Uber Security Chief Found Guilty of Data Breach Coverup

A U.S. federal court jury has found former Uber Chief Security Officer Joseph Sullivan guilty of not disclosing a 2016 breach of customer and driver records to regulators and attempting to cover up the incident. Sullivan has been convicted on two counts: One for obstructing justice by not reporting the incident and another for misprision. He faces a maximum of five years in prison for the from The Hacker News https://ift.tt/PqaEgRb via IFTTT

Telstra Telecom Suffers Data Breach Potentially Exposing Employee Information

Australia's largest telecommunications company Telstra disclosed that it was the victim of a data breach through a third-party, nearly two weeks after Optus reported a breach of its own. "There has been no breach of Telstra's systems," Narelle Devine, the company's chief information security officer for the Asia Pacific region, said. "And no customer account data was involved." It from The Hacker News https://ift.tt/VS8ktDv via IFTTT

Want More Secure Software? Start Recognizing Security-Skilled Developers

Professional developers want to do the right thing, but in terms of security, they are rarely set up for success. Organizations must support their upskilling with precision training and incentives if they want secure software from the ground up. The cyber threat landscape grows more complex by the day, with our data widely considered highly desirable “digital gold”. Attackers are constantly from The Hacker News https://ift.tt/ym8kqpj via IFTTT

Canadian Netwalker Ransomware Affiliate Sentenced to 20 Years in U.S. Prison

A former affiliate of the Netwalker ransomware has been sentenced to 20 years in prison in the U.S., a little over three months after the Canadian national pleaded guilty to his role in the crimes. Sebastien Vachon-Desjardins, 35, has also been ordered to forfeit $21,500,000 that was illicitly obtained from dozens of victims globally, including companies, municipalities, hospitals, law from The Hacker News https://ift.tt/Q3cFk1K via IFTTT

Knuth's Art of Computer Programming, V 4B, has gone into print

Knuth's Art of Computer Programming, V 4B, has gone into print 748 by inetsee | 251 comments on Hacker News.

Mitigation for Exchange Zero-Days Bypassed! Microsoft Issues New Workarounds

Microsoft has revised its mitigation measures for the newly disclosed and actively exploited zero-day flaws in Exchange Server after it was found that they could be trivially bypassed. The two vulnerabilities, tracked as CVE-2022-41040 and CVE-2022-41082, have been codenamed ProxyNotShell due to similarities to another set of flaws called ProxyShell, which the tech giant resolved last year. from The Hacker News https://ift.tt/lKaFEzh via IFTTT

Russian Hacker Arrested in India for Reportedly Helping Students Cheat in JEE-Main Exam

India's Central Bureau of Investigation (CBI) on Monday disclosed that it has detained a Russian national for allegedly hacking into a software platform used to conduct engineering entrance assessments in the country in 2021. "The said accused was detained by the Bureau of Immigration at Indira Gandhi International Airport, Delhi while arriving in India from Almaty, Kazakhstan," the primary from The Hacker News https://ift.tt/RMufge8 via IFTTT

Optus Hack Exposes Data of Nearly 2.1 Million Australian Telecom Customers

Australian telecom giant Optus on Monday confirmed that nearly 2.1 million of its current and former customers suffered a leak of their personal information and at least one form of identification number as a result of a data breach late last month. The company also said it has engaged the services of Deloitte to conduct an external forensic assessment of the attack to "understand how it from The Hacker News https://ift.tt/JXVmNMd via IFTTT

Comm100 Chat Provider Hijacked to Spread Malware in Supply Chain Attack

A threat actor likely with associations to China has been attributed to a new supply chain attack that involves the use of a trojanized installer for the Comm100 Live Chat application to distribute a JavaScript backdoor. Cybersecurity firm CrowdStrike said the attack made use of a signed Comm100 desktop agent app for Windows that was downloadable from the company's website. The scale of the from The Hacker News https://ift.tt/Fv0e71O via IFTTT

Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers

The recently discovered Linux-Based ransomware strain known as Cheerscrypt has been attributed to a Chinese cyber espionage group known for operating short-lived ransomware schemes. Cybersecurity firm Sygnia attributed the attacks to a threat actor it tracks under the name Emperor Dragonfly, which is also known as Bronze Starlight (Secureworks) and DEV-0401 (Microsoft). "Emperor Dragonfly from The Hacker News https://ift.tt/ebdm1Rn via IFTTT

Hackers Exploiting Dell Driver Vulnerability to Deploy Rootkit on Targeted Computers

The North Korea-backed Lazarus Group has been observed deploying a Windows rootkit by taking advantage of an exploit in a Dell firmware driver, highlighting new tactics adopted by the state-sponsored adversary. The Bring Your Own Vulnerable Driver (BYOVD) attack, which took place in the autumn of 2021, is another variant of the threat actor's espionage-oriented activity called Operation In(ter) from The Hacker News https://ift.tt/5RAcFCW via IFTTT

Ex-NSA Employee Arrested for Trying to Sell U.S. Secrets to a Foreign Government

A former U.S. National Security Agency (NSA) employee has been arrested on charges of attempting to sell classified information to a foreign spy, who was actually an undercover agent working for the Federal Bureau of Investigation (FBI). Jareh Sebastian Dalke, 30, was employed at the NSA for less than a month from June 6, 2022, to July 1, 2022, serving as an Information Systems Security Designer from The Hacker News https://ift.tt/nmY1fiP via IFTTT

Postgres WASM

Postgres WASM 719 by kiwicopple | 151 comments on Hacker News.

The PS5 Has Been Jailbroken

The PS5 Has Been Jailbroken 707 by mihau | 358 comments on Hacker News.

Tell HN: A disabled 40-year-old person founded a startup and makes a living

Tell HN: A disabled 40-year-old person founded a startup and makes a living 704 by michaelcao | 132 comments on Hacker News. I am Michael Cao. I am from Viet Nam. I suffered the polio disease and became disabled when i was one year old. When covid 19 pandemic hit the world. All people has suffered a lot. I and my friend, Canadian guy, decided to cofound 2HAC Studio because we thought that we need to do something to help people. We don't want to hire any employees to keep the cost at minimum (only spend 9.99$ per year for domain). I keep my job at American company in Viet Nam and my cofounder also still worked at a Bank of Canada. We spent our free time to implement and marketing our products We have been developing the Google workspace addons. Out technology stack are App Script, VueJS for addons. Hugo for our website. We hosted our website in Google Cloud. Paypal is our payment system. Tawk for customer support. All of them are free. At 2020, we had a pain point in Viet Nam bec...

Stadia died because no one trusts Google

Stadia died because no one trusts Google 628 by lots2learn | 505 comments on Hacker News.

Pay What You Want for This Collection of White Hat Hacking Courses

Whether you relish a mental challenge or fancy a six-figure paycheck, there are many good reasons to get into white hat hacking. That said, picking up the necessary knowledge to build a new career can seem like a daunting task. There is a lot to learn, after all. To help you get started, The Hacker News Deals is currently running an eye-catching offer: pay what you want for one video course, and from The Hacker News https://ift.tt/ZRIixT5 via IFTTT

CISA Warns of Hackers Exploiting Critical Atlassian Bitbucket Server Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed critical flaw impacting Atlassian's Bitbucket Server and Data Center to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2022-36804, the issue relates to a command injection vulnerability that could allow malicious actors to gain arbitrary from The Hacker News https://ift.tt/4K8YrVz via IFTTT