Sign in
Sign in
Recover your password.
A password will be e-mailed to you.
Trending
- Governments and Business Are Key Partners Against Cybercrime
- Cyber attack hits Arnold Clark
- New Russian-Backed Gamaredon’s Spyware Variants Targeting Ukrainian Authorities
- The $10 Trillion Case For Decentralized Cybersecurity
- Experts warn of 2 flaws in open-source software ImageMagickSecurity Affairs
- Cyber Attack Simulation Tools Market May See a Big Move |
- Maha: Top manufacturer of defence equipment faces cyber attack, police registers FIR
- 44 NI service stations offering fuel discount today
- Cybersecurity budgets are going up. So why aren’t breaches going down?
- North Korean Hackers Exploit Unpatched Zimbra Devices in ‘No Pineapple’ Campaign
Browsing Category
HackerNews
Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility
Feb 01, 2023Ravie LakshmananVulnerability
Cybersecurity researchers have disclosed details of two security flaws in the open source ImageMagick software that could potentially lead to a denial-of-service (DoS) and information…
Experts Warn of ‘Ice Breaker’ Cyberattacks Targeting Gaming and Gambling Industry
Feb 01, 2023Ravie LakshmananGaming / Cyber Attack
A new attack campaign has targeted the gaming and gambling sectors since at least September 2022, just months prior to the ICE London 2023 gaming industry trade fair event that's…
New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices
Feb 01, 2023Ravie Lakshmanan
A new exploit has been devised to "unenroll" enterprise- or school-managed Chromebooks from administrative control.
Enrolling ChromeOS devices makes it possible to enforce device policies as set by the…
Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards
Feb 01, 2023Ravie LakshmananPayment Security / Risk
The Brazilian threat actors behind an advanced and modular point-of-sale (PoS) malware known as Prilex have reared their head once again with new updates that allow it to block…
Auditing Kubernetes with Open Source SIEM and XDR
Feb 01, 2023The Hacker NewsSIEM / Kubernetes
Container technology has gained traction among businesses due to the increased efficiency it provides. In this regard, organizations widely use Kubernetes for deploying, scaling, and…
Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Hack Corporate Email…
Feb 01, 2023Ravie LakshmananEnterprise Security / Authentication
Microsoft on Tuesday said it took steps to disable fake Microsoft Partner Network (MPN) accounts that were used for creating malicious OAuth applications as part of a…
Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
Feb 01, 2023Ravie LakshmananServer and Cloud Security
Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after three security vulnerabilities were…
You Don’t Know Where Your Secrets Are
Do you know where your secrets are? If not, I can tell you: you are not alone.
Hundreds of CISOs, CSOs, and security leaders, whether from small or large companies, don't know either. No matter the organization's size, the…
New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector
Jan 31, 2023Ravie LakshmananCyber War / Malware
The Russia-affiliated Sandworm used yet another wiper malware strain dubbed NikoWiper as part of an attack that took place in October 2022 targeting an energy sector company in Ukraine.…
Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years
Jan 31, 2023Ravie LakshmananThreat Detection / Malware
A shellcode-based packer dubbed TrickGate has been successfully operating without attracting notice for over six years, while enabling threat actors to deploy a wide range of…