Sign in
Sign in
Recover your password.
A password will be e-mailed to you.
Trending
- Dymocks CEO Outlines Details of Data Breach – Australian Cyber Security Magazine
- Clorox slashes forecast due to effects of cyberattack; stock falls
- Estes opens online portal for customers as cyberattack drags on
- Clorox says sales and profit took a big hit from cyberattack
- Clorox Expects Sharp Decline in Sales After Cyber Attack
- MGM Hackers Scattered Spider Linked to Clorox Security Attack
- 8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them
- Researchers Link DragonEgg Android Spyware to LightSpy iOS Surveillanceware
- ICRC introduces cyber warfare rules for hacktivists
- The big debate: is AI a blessing or curse for cybersecurity?
Browsing Category
HackerNews
New Linux Flaw Enables Privilege Escalation on Major Distributions
Oct 04, 2023THNEndpoint Security / Vulnerability
A new Linux security vulnerability dubbed Looney Tunables has been discovered in the GNU C library's ld.so dynamic loader that, if successfully exploited, could lead to a local…
Qualcomm Releases Patch for 3 new Zero-Days Under Active Exploitation
Oct 03, 2023THNZero Day / Vulnerability
Chipmaker Qualcomm has released security updates to address 17 vulnerabilities in various components, while warning that three other zero-days have come under active exploitation.
Of the 17…
PyTorch Models Vulnerable to Remote Code Execution via ShellTorch
Oct 03, 2023THNArtificial Intelligence / Cyber Threat
Cybersecurity researchers have disclosed multiple critical security flaws in the TorchServe tool for serving and scaling PyTorch models that could be chained to achieve remote code…
Over 3 Dozen Data-Stealing Malicious npm Packages Found Targeting Developers
Oct 03, 2023THNSoftware Security / Hacking
Nearly three dozen counterfeit packages have been discovered in the npm package repository that are designed to exfiltrate sensitive data from developer systems, according to findings from…
API Security Trends 2023 – Have Organizations Improved their Security Posture?
Oct 03, 2023The Hacker NewsAPI Security / Data Security
APIs, also known as application programming interfaces, serve as the backbone of modern software applications, enabling seamless communication and data exchange between different…
Researcher Reveals New Techniques to Bypass Cloudflare’s Firewall and DDoS Protection
Firewall and distributed denial-of-service (DDoS) attack prevention mechanisms in Cloudflare can be circumvented by exploiting gaps in cross-tenant security controls, defeating the very purpose of these safeguards, it has emerged.…
Arm Issues Patch for Mali GPU Kernel Driver Vulnerability Amidst Ongoing Exploitation
Oct 03, 2023THNCyber Attack / Vulnerability
Arm has released security patches to contain a security flaw in the Mali GPU Kernel Driver that has come under active exploitation in the wild.
Tracked as CVE-2023-4211, the shortcoming…
Scattered Spider Getting SaaS-y in the Cloud
LUCR-3 overlaps with groups such as Scattered Spider, Oktapus, UNC3944, and STORM-0875 and is a financially motivated attacker that leverages the Identity Provider (IDP) as initial access into an environment with the goal of stealing…
Unveiling the Silent Killer of Cyber Security Risk Across Industries
Introduction
In today's interconnected digital ecosystem, Application Programming Interfaces (APIs) play a pivotal role in enabling seamless communication and data exchange between various software applications and systems. APIs act as…
A Year-Long Web Skimming Campaign Targeting Online Payment Businesses
Oct 02, 2023THNWebb Security / Payment Security
A financially motivated campaign has been targeting online payment businesses in the Asia Pacific, North America, and Latin America with web skimmers for more than a year.
The BlackBerry…