Posts

Microsoft Documents Over 200 Cyberattacks by Russia Against Ukraine

At least six different Russia-aligned actors launched no less than 237 cyberattacks against Ukraine from February 23 to April 8, including 38 discrete destructive attacks that irrevocably destroyed files in hundreds of systems across dozens of organizations in the country. "Collectively, the cyber and kinetic actions work to disrupt or degrade Ukrainian government and military functions and from The Hacker News https://ift.tt/u3OtXSa via IFTTT

Airbnb’s design to live and work anywhere

Airbnb’s design to live and work anywhere 582 by mji | 413 comments on Hacker News.

Bits of advice I wish I had known

Bits of advice I wish I had known 568 by npalli | 324 comments on Hacker News.

Microsoft Azure Vulnerability Exposes PostgreSQL Databases to Other Customers

Microsoft on Thursday disclosed that it addressed a pair of issues with the Azure Database for PostgreSQL Flexible Server that could result in unauthorized cross-account database access in a region. "By exploiting an elevated permissions bug in the Flexible Server authentication process for a replication user, a malicious user could leverage an improperly anchored regular expression to bypass from The Hacker News https://ift.tt/EWYfUVb via IFTTT

Indian Govt Orders Organizations to Report Security Breaches Within 6 Hours to CERT-In

India's computer and emergency response team, CERT-In, on Thursday published new guidelines that require service providers, intermediaries, data centers, and government entities to compulsorily report cybersecurity incidents, including data breaches, within six hours. "Any service provider, intermediary, data center, body corporate and Government organization shall mandatorily report cyber from The Hacker News https://ift.tt/3bEWzN2 via IFTTT

Gnome patent troll stripped of patent rights

Gnome patent troll stripped of patent rights 506 by reedciccio | 153 comments on Hacker News.

New RIG Exploit Kit Campaign Infecting Victims' PCs with RedLine Stealer

A new campaign leveraging an exploit kit has been observed abusing an Internet Explorer flaw patched by Microsoft last year to deliver the RedLine Stealer trojan. "When executed, RedLine Stealer performs recon against the target system (including username, hardware, browsers installed, anti-virus software) and then exfiltrates data (including passwords, saved credit cards, crypto wallets, VPN from The Hacker News https://ift.tt/j6Xmv8e via IFTTT