Posts

Select * from cloud

Select * from cloud 609 by kiyanwang | 239 comments on Hacker News.

Why modern software is slow

Why modern software is slow 600 by soheilpro | 740 comments on Hacker News.

North Korean Hackers Weaponizing Open-Source Software in Latest Cyber Attacks

A "highly operational, destructive, and sophisticated nation-state activity group" with ties to North Korea has been weaponizing open source software in their social engineering campaigns aimed at companies around the world since June 2022. Microsoft's threat intelligence teams, alongside LinkedIn Threat Prevention and Defense, attributed the intrusions with high confidence to Zinc, which is from The Hacker News https://ift.tt/Cx5FzRt via IFTTT

Make-A-Video: AI system that generates videos from text

Make-A-Video: AI system that generates videos from text 685 by hardmaru | 323 comments on Hacker News.

Google is shutting down Stadia

Google is shutting down Stadia 698 by vyrotek | 794 comments on Hacker News.

Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware

A Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced and complex malware to steal money by means of fraudulent transactions. "The Prilex group has shown a high level of knowledge about credit and debit card transactions, and how software used for payment processing works," Kaspersky researchers said. "This enables the attackers to keep from The Hacker News https://ift.tt/gBrTRPt via IFTTT

Five Steps to Mitigate the Risk of Credential Exposure

Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for account takeover attacks, exposing organizations to breaches, ransomware, and data theft.  While CISOs are aware of growing identity threats and have multiple tools in their arsenal to help reduce the potential risk, the from The Hacker News https://ift.tt/Atog1lq via IFTTT