Thursday, April 4, 2019

NSA Releases GHIDRA Source Code - Free Reverse Engineering Tool

The Hacker News Daily Updates
Newsletter
cover

An Introduction to Microsoft Azure and the Microsoft Cloud

Cloud computing is now one of the biggest necessities for any business that carries out web-based operations.

Download Now Sponsored
LATEST NEWS Apr 4, 2019

NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool

Update (4/4/2019) — Great news. NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available on its Github repository. GHIDRA is agency's home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade ...

Read More
Twitter Facebook LinkedIn

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. First, the social media company was caught asking some of its new users to share passwords for their registered email accounts and now… ...the bad week gets worse with a new privacy breach. More than half a billion records of millions of Facebook users ...

Read More
Twitter Facebook LinkedIn

WordPress iOS App Bug Leaked Secret Access Tokens to Third-Party Sites

If you have a "private" blog with WordPress.com and are using its official iOS app to create or edit posts and pages, the secret authentication token for your admin account might have accidentally been leaked to third-party websites. WordPress has recently patched a severe vulnerability in its iOS ...

Read More
Twitter Facebook LinkedIn

Georgia Tech Data Breach Exposes 1.3 Million Users' Personal Data

The Georgia Institute of Technology, well known as Georgia Tech, has confirmed a data breach that has exposed personal information of 1.3 million current and former faculty members, students, staff and student applicants. In a brief note published Tuesday, Georgia Tech says an unknown outside ...

Read More
Twitter Facebook LinkedIn

Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations

Visibility into an environment attack surface is the fundamental cornerstone to sound security decision making. However, the standard process of 3rd party threat assessment as practiced today is both time consuming and expensive. Cynet changes the rules of the game with a free threat assessment ...

Read More
Twitter Facebook LinkedIn
cover

An Introduction to Microsoft Azure and the Microsoft Cloud

Cloud computing is now one of the biggest necessities for any business that carries out web-based operations.

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home