Posts

FTC restores rigorous enforcement of law banning unfair methods of competition

FTC restores rigorous enforcement of law banning unfair methods of competition 497 by nabilhat | 376 comments on Hacker News.

FTX to file for U.S. bankruptcy, CEO resigns

FTX to file for U.S. bankruptcy, CEO resigns 552 by mfiguiere | 1071 comments on Hacker News.

Bubbles

Bubbles 578 by findhorn | 56 comments on Hacker News.

FTX tapped into customer accounts to fund risky bets, setting up its downfall

FTX tapped into customer accounts to fund risky bets, setting up its downfall 504 by mfiguiere | 670 comments on Hacker News.

Experts Uncover Two Long-Running Android Spyware Campaigns Targeting Uyghurs

Two long-running surveillance campaigns have been found targeting the Uyghur community in China and elsewhere with Android spyware tools designed to harvest sensitive information and track their whereabouts. This encompasses a previously undocumented malware strain called BadBazaar and updated variants of an espionage artifact dubbed MOONSHINE by researchers from the University of Toronto's from The Hacker News https://ift.tt/ahlHVmy via IFTTT

VPN vs. DNS Security

When you are trying to get another layer of cyber protection that would not require a lot of resources, you are most likely choosing between a VPN service & a DNS Security solution. Let's discuss both.  VPN Explained VPN stands for Virtual Private Networks and basically hides your IP and provides an encrypted server by redirecting your traffic via a server run by a VPN host. It establishes a from The Hacker News https://ift.tt/tYgwr1y via IFTTT

Microsoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland

Microsoft on Thursday attributed the recent spate of ransomware incidents targeting transportation and logistics sectors in Ukraine and Poland to a threat cluster that shares overlaps with the Russian state-sponsored Sandworm group. The attacks, which were disclosed by the tech giant last month, involved a strain of previously undocumented malware called Prestige and is said to have taken place from The Hacker News https://ift.tt/nP256DT via IFTTT

Musk’s first email to Twitter staff ends remote work

Musk’s first email to Twitter staff ends remote work 495 by mfiguiere | 939 comments on Hacker News.

What chroot taught me about containers

What chroot taught me about containers 495 by mmphosis | 167 comments on Hacker News.

Hacker Rewarded $70,000 for Finding Way to Bypass Google Pixel Phones' Lock Screens

Google has resolved a high-severity security issue affecting all Pixel smartphones that could be trivially exploited to unlock the devices. The vulnerability, tracked as CVE-2022-20465 and reported by security researcher David Schütz in June 2022, was remediated as part of the search giant's monthly Android update for November 2022. "The issue allowed an attacker with physical access to bypass from The Hacker News https://ift.tt/64hbxl2 via IFTTT

Podman Desktop: A Free OSS Alternative to Docker Desktop

Podman Desktop: A Free OSS Alternative to Docker Desktop 739 by twelvenmonkeys | 176 comments on Hacker News.

Is Cybersecurity Awareness Month Anything More Than PR?

Cybersecurity Awareness Month has been going on since 2004. This year, Cybersecurity Awareness Month urged the public, professionals, and industry partners to "see themselves in cyber" in the following ways:  The public, by taking action to stay safe online. Professionals, by joining the cyber workforce. Cyber industry partners, as part of the cybersecurity solution. CISA outlined four "things from The Hacker News https://ift.tt/O1tJdj9 via IFTTT

Re-Focusing Cyber Insurance with Security Validation

The rise in the costs of data breaches, ransomware, and other cyber attacks leads to rising cyber insurance premiums and more limited cyber insurance coverage. This cyber insurance situation increases risks for organizations struggling to find coverage or facing steep increases. Some Akin Gump Strauss Hauer & Feld LLP's law firm clients, for example, reported a three-fold increase in insurance from The Hacker News https://ift.tt/HqW0UJA via IFTTT

High-Severity Flaw Reported in Critical System Used in Oil and Gas Companies

Cybersecurity researchers have disclosed details of a new vulnerability in a system used across oil and gas organizations that could be exploited by an attacker to inject and execute arbitrary code. The vulnerability, tracked as CVE-2022-0902 (CVSS score: 8.1), is a path-traversal vulnerability in ABB Totalflow flow computers and remote controllers. "Attackers can exploit this flaw to gain root from The Hacker News https://ift.tt/5i6wmcj via IFTTT

New UEFI Firmware Flaws Reported in Several Lenovo Notebook Models

PC maker Lenovo has addressed yet another set of three shortcomings in the Unified Extensible Firmware Interface (UEFI) firmware affecting several Yoga, IdeaPad, and ThinkBook devices. "The vulnerabilities allow disabling UEFI Secure Boot or restoring factory default Secure Boot databases (incl. dbx): all simply from an OS," Slovak cybersecurity firm ESET explained in a series of tweets. UEFI from The Hacker News https://ift.tt/qlNhmU4 via IFTTT

My full statement regarding DOOM Eternal

My full statement regarding DOOM Eternal 693 by bangonkeyboard | 201 comments on Hacker News.

Several Cyber Attacks Observed Leveraging IPFS Decentralized Network

A number of phishing campaigns are leveraging the decentralized Interplanetary Filesystem (IPFS) network to host malware, phishing kit infrastructure, and facilitate other attacks. "Multiple malware families are currently being hosted within IPFS and retrieved during the initial stages of malware attacks," Cisco Talos researcher Edmund Brumaghin said in an analysis shared with The Hacker News. from The Hacker News https://ift.tt/t6YNSIG via IFTTT

Meta lays off 11,000 people

Meta lays off 11,000 people 649 by technics256 | 547 comments on Hacker News.

Install Latest Windows Update ASAP! Patches Issued for 6 Actively Exploited Zero-Days

Microsoft's latest round of monthly security updates has been released with fixes for 68 vulnerabilities spanning its software portfolio, including patches for six actively exploited zero-days. 12 of the issues are rated Critical, two are rated High, and 55 are rated Important in severity. This also includes the weaknesses that were closed out by OpenSSL the previous week. Also separately  from The Hacker News https://ift.tt/ALPHi8Q via IFTTT

Binance to acquire FTX

Binance to acquire FTX 564 by jmsflknr | 601 comments on Hacker News.