Friday, June 3, 2022

US confirms military hackers have conducted cyber operations in support of Ukraine - CNNPolitics

Publisher: CNN
Date: 2022-06-02T18:07:58Z
Author: Sean Lyngaas CNN
Reference: (Read more) Visit Source



Hackers can get into these popular smart home gadgets

Even though they are made by two of the largest technology companies in the world, it doesn't mean they can't be hacked. A research group recently found that many older models are no longer secure.

U.K.-based consumer products website Which? conducted tests on several smart home gadgets and found that many can leave you vulnerable to hackers. The study highlights the importance of updating your technology regularly.

logo
Publisher: Komando.com
Date: 2022-06-03T00:00:00 00:00
Twitter: @kimkomando
Reference: (Read more) Visit Source



Two-thirds of ethical hackers considering bug bounty hunting as a full-time career | SC Media

Women from all segments of the cybersecurity market qualify – vendors, practitioners, educators, researchers – with the goal being to spotlight the advantage of broadening the aperture to recognize talent and power where it exists, not just where societal norms have historically led us to look.

Date: 2022-05-31T16:54:16.000-04:00
Author: Steve Zurier
Reference: (Read more) Visit Source



China-linked hackers are exploiting a new vulnerability in Microsoft Office - The Verge

The Microsoft Word vulnerability first began to receive widespread attention on May 27th, when a security research group known as Nao Sec took to Twitter to discuss a sample submitted to the online malware scanning service VirusTotal.

In a blog post published on May 29th, researcher Kevin Beaumont shared further details of the vulnerability.

Publisher: The Verge
Date: 2022-06-01T13:52:58-04:00
Author: Corin Faife
Twitter: @verge
Reference: (Read more) Visit Source



Okta's Fearful Cyber Response Worse Than Hackers' Peek—How 3 Tempting Tech Crisis Shortcuts Cost ...

Regardless of precautions and incident plans, cyberattacks terrify C-suites. The recent identity-security firm Okta breach spotlights a common leadership response mistake — sacrificing customer trust for overestimated legal risk.

In January 2022, hacker group LAPSUS$ infiltrated an Okta contractor's computer. Relying on its vendor's initial forensics, Okta opted not to disclose the brief attack. The breach was eventually made public in March via a series of hacker posts.

logo
Publisher: Forbes
Date: 2022-06-01
Author: Noah Barsky
Twitter: @forbes
Reference: (Read more) Visit Source



Microsoft disrupts Iranian-linked hackers targeting organizations in Israel – TechCrunch

Microsoft said on Thursday that it has successfully “identified and disabled” a previously unreported Lebanon-based hacking group that it believes is working with Iranian intelligence.

The hacking group, tracked by the Microsoft Threat Intelligence Center (MSTIC) as "Polonium," targeted or compromised more than 20 organizations based in Israel and one intergovernmental organization with operations in Lebanon over the past three months, with a focus on critical manufacturing, IT ...

logo
Publisher: TechCrunch
Date: 2022-06-03 09:11:58
Author: Carly Page
Twitter: @techcrunch
Reference: (Read more) Visit Source



Hackers take control of Facebook accounts posting sexually explicit images and fraud charges - ...
Publisher: ABC11 Raleigh-Durham
Date: 2022-06-02T22:44:00Z
Twitter: @ABC11_WTVD
Reference: (Read more) Visit Source



Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability

Atlassian has warned of a critical unpatched remote code execution vulnerability impacting Confluence Server and Data Center products that it said is being actively exploited in the wild.

The Australian software company credited cybersecurity firm Volexity for identifying the flaw, which is being tracked as CVE-2022-26134 .

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source



Secrets in code make passwords vulnerable to hackers | Security Magazine

Whether stored in a public or private code repository, hackers can target enterprise secrets and find PII and other organizational secrets.

The "Secrets Insights Across the Software Supply Chain'' report from Apiiro analyzed over 25,000 repositories ranging from small to large organizations to discover the state of secrets in today's code.

Author: Security Staff
Reference: (Read more) Visit Source



Hackers steal WhatsApp accounts using call forwarding trick

Rahul Sasi, the founder and CEO of digital risk protection company CloudSEK, posted some details about the method saying that it is used to hack WhatsApp account. 

BleepingComputer tested and found that the method works, albeit with some caveats that a sufficiently skilled attacker could overcome.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source







Army of the Alien Monkeys


Earth is nice. We want it.

We welcome your submission to us.




No comments:

Post a Comment

Popular Posts