Posts

Deno 1.9

Deno 1.9 555 by searchableguy | 187 comments on Hacker News.

Simplify, then Add Lightness – Consolidating the Technology to Better Defend Ourselves

Image
One of the biggest consequences of the rapidly evolving cybersecurity threat landscape is that defenses must constantly build bigger systems to defend themselves.  This leads to both more complex systems and often less communication between them. More importantly, it can lead companies to invest in disparate “best in class” components instead of finding the best fit for their needs. The constant from The Hacker News https://ift.tt/3e4JMBR via IFTTT

Update Your Chrome Browser to Patch 2 New In-the-Wild 0-Day Exploits

Image
Google on Tuesday released a new version of Chrome web-browsing software for Windows, Mac, and Linux with patches for two newly discovered security vulnerabilities for both of which it says exploits exist in the wild, allowing attackers to engage in active exploitation. One of the two flaws concerns an insufficient validation of untrusted input in its V8 JavaScript rendering engine ( from The Hacker News https://ift.tt/32cdwqT via IFTTT

NSA Discovers New Vulnerabilities Affecting Microsoft Exchange Servers

Image
In its April slate of patches, Microsoft rolled out fixes for a total of 114 security flaws, including an actively exploited zero-day and four remote code execution bugs in Exchange Server. Of the 114 flaws, 19 are rated as Critical, 88 are rated Important, and one is rated Moderate in severity. Chief among them is CVE-2021-28310, a privilege escalation vulnerability in Win32k that's said to be from The Hacker News https://ift.tt/3wWEeBR via IFTTT

New NAME:WRECK Vulnerabilities Impact Nearly 100 Million IoT Devices

Image
Security researchers have uncovered nine vulnerabilities affecting four TCP/IP stacks impacting more than 100 million consumer and enterprise devices that could be exploited by an attacker to take control of a vulnerable system. Dubbed "NAME:WRECK" by Forescout and JSOF, the flaws are the latest in series of studies undertaken as part of an initiative called Project Memoria to study the security from The Hacker News https://ift.tt/3sbjrHb via IFTTT

Hackers Using Website's Contact Forms to Deliver IcedID Malware

Image
Microsoft has warned organizations of a "unique" attack campaign that abuses contact forms published on websites to deliver malicious links to businesses via emails containing fake legal threats, in what's yet another instance of adversaries abusing legitimate infrastructure to mount evasive campaigns that bypass security protections. "The emails instruct recipients to click a link to review from The Hacker News https://ift.tt/3s9ABox via IFTTT

Detecting the "Next" SolarWinds-Style Cyber Attack

Image
The SolarWinds attack, which succeeded by utilizing the sunburst malware, shocked the cyber-security industry. This attack achieved persistence and was able to evade internal systems long enough to gain access to the source code of the victim. Because of the far-reaching SolarWinds deployments, the perpetrators were also able to infiltrate many other organizations, looking for intellectual from The Hacker News https://ift.tt/3uN1kJi via IFTTT