The hacker new
-
New Cache Poisoning Attack Lets Attackers Target CDN Protected Sites
A team of German cybersecurity researchers has discovered a new cache poisoning attack against web caching systems that could be used by an...
-
Cynet's Vulnerability Assessment Enables Organizations to Dramatically Reduce their Risk Exposure
Protection from cyberattacks begins way before attackers launch their weapons on an organization. Continuously monitoring the environment for...
-
NordVPN Breach FAQ – What Happened and What's At Stake?
NordVPN, one of the most popular and widely used VPN services out there, yesterday disclosed details of a security incident that apparently...
-
Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software
Fair elections are the lifelines of democracy, but in recent years election hacking has become a hot topic worldwide. Whether it's American voting...
-
Chrome for Android Enables Site Isolation Security Feature for All Sites with Login
After enabling 'Site Isolation' security feature in Chrome for desktops last year, Google has now finally introduced 'the extra line of defence'...
-
Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested
The United States Department of Justice said today that they had arrested hundreds of criminals in a global crackdown after taking down the largest...
-
Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers
A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines...
-
Facebook Now Pays Hackers for Reporting Security Bugs in 3rd-Party Apps
Following a series of security mishaps and data abuse through its social media platform, Facebook today expanding its bug bounty program in a very...
-
Adobe Releases Out-of-Band Security Patches for 82 Flaws in Various Products
No, it's not a patch Tuesday. It's the third Tuesday of the month, and as The Hacker News shared an early heads-up late last week on Twitter,...
-
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted
Attention Linux Users! A vulnerability has been discovered in Sudo—one of the most important, powerful, and commonly used utilities that comes as...
-
Apple Under Fire Over Sending Some Users Browsing Data to China's Tencent
Do you know Apple is sending iOS web browsing data of some of its users to Chinese Internet company Tencent? I am sure many of you are not aware...
-
SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks
Until now, I'm sure you all might have heard of the SimJacker vulnerability disclosed exactly a month ago that affects a wide range of SIM cards...