Posts

Chinese Hackers Begin Exploiting Latest Microsoft Office Zero-Day Vulnerability

An advanced persistent threat (APT) actor aligned with Chinese state interests has been observed weaponizing the new zero-day flaw in Microsoft Office to achieve code execution on affected systems. "TA413 CN APT spotted [in-the-wild] exploiting the Follina zero-day using URLs to deliver ZIP archives which contain Word Documents that use the technique," enterprise security firm Proofpoint said in from The Hacker News https://ift.tt/klxJAHG via IFTTT

SomaFM

SomaFM 537 by Datenstrom | 127 comments on Hacker News.

Ask HN: Burnt-out, directionless but want to turn it around

Ask HN: Burnt-out, directionless but want to turn it around 527 by RoseBuckler | 284 comments on Hacker News. I've been programming on and off since the age of 16. Unfortunately, I have never been a rockstar programmer. I've always pieced code together from multiple sources to create programs but I've always failed to come up with a solution from scratch of my own and provide any value. I've always wondered how other smart people are able to come up with libraries, services and various solutions from scratch. I've devised countless ideas only to never execute them for various reasons or get started with them only to never fully complete them and see it all the way through. I've already wasted my entire teens and 20s, current 28 years old, working as a software engineer (Full-Stack) at a startup for ~4 years. I've been feeling like a loser and not good enough for this career even though I am a sole developer for Mobile and Web platforms at this startup in ...

SideWinder Hackers Launched Over a 1,000 Cyber Attacks Over the Past 2 Years

An "aggressive" advanced persistent threat (APT) group known as SideWinder has been linked to over 1,000 new attacks since April 2020. "Some of the main characteristics of this threat actor that make it stand out among the others, are the sheer number, high frequency and persistence of their attacks and the large collection of encrypted and obfuscated malicious components used in their from The Hacker News https://ift.tt/mHeO2Pv via IFTTT

Learn Raspberry Pi and Arduino with 9 Online Developer Training Courses

This is an exciting time for the Internet of Things. According to Deloitte research, the average U.S. household now has 25 connected devices — and new products are being launched every day. This rush of demand means that many tech companies are looking for developers with IoT knowledge. And even if you don’t want to specialize in this field, the programming skills are transferable. Featuring from The Hacker News https://ift.tt/kMHhRd4 via IFTTT

Interpol Nabs 3 Nigerian Scammers Behind Malware-based Attacks

Interpol on Monday announced the arrest of three suspected global scammers in Nigeria for using remote access trojans (RATs) such as Agent Tesla to facilitate malware-enabled cyber fraud. "The men are thought to have used the RAT to reroute financial transactions, stealing confidential online connection details from corporate organizations, including oil and gas companies in South East Asia, the from The Hacker News https://ift.tt/qzHUNZ4 via IFTTT

Microsoft Releases Workarounds for Office Vulnerability Under Active Exploitation

Microsoft on Monday published guidance for a newly discovered zero-day security flaw in its Office productivity suite that could be exploited to achieve code execution on affected systems. The weakness, now assigned the identifier CVE-2022-30190, is rated 7.8 out of 10 for severity on the CVSS vulnerability scoring system. Microsoft Office versions Office 2013, Office 2016, Office 2019, and from The Hacker News https://ift.tt/EsIl5De via IFTTT