Tuesday, August 17, 2021

Attackers Can Weaponize Firewalls and Middleboxes for Amplified DDoS Attacks

The Hacker News Daily Updates
Newsletter
cover

Cloud Computing For Dummies, 2nd Edition ($21.00 Value) FREE for a Limited Time

Get your head--and your business--into the Cloud

Download Now Sponsored
LATEST NEWS Aug 17, 2021

Malicious Ads Target Cryptocurrency Users With Cinobi Banking Trojan

A new social engineering-based malvertising campaign targeting Japan has been found to deliver a malicious application that deploys a banking trojan on compromised Windows machines to steal credentials associated with cryptocurrency accounts. The application masquerades as an animated porn game, a ...

Read More
Twitter Facebook LinkedIn

Solution Providers Can Now Add Incident Response to Their Services Portfolio For Free

The Incident Response (IR) services market is in accelerated growth due to the rise in cyberattacks that result in breaches. More and more organizations, across all sizes and verticals, choose to outsource IR to 3rd party service providers over handling security incidents in-house. Cynet is now ...

Read More
Twitter Facebook LinkedIn

Multiple Flaws Affecting Realtek Wi-Fi SDKs Impact Nearly a Million IoT Devices

Taiwanese chip designer Realtek is warning of four security vulnerabilities in three software development kits (SDKs) accompanying its WiFi modules, which are used in almost 200 IoT devices made by at least 65 vendors. The flaws, which affect Realtek SDK v2.x, Realtek "Jungle" SDK ...

Read More
Twitter Facebook LinkedIn

Attackers Can Weaponize Firewalls and Middleboxes for Amplified DDoS Attacks

Weaknesses in the implementation of TCP protocol in middleboxes and censorship infrastructure could be weaponized as a vector to stage reflected denial of service (DoS) amplification attacks against any target, surpassing many of the existing UDP-based amplification factors to date. Detailed by a ...

Read More
Twitter Facebook LinkedIn

Dozens of STARTTLS Related Flaws Found Affecting Popular Email Clients

Security researchers have disclosed as many as 40 different vulnerabilities associated with an opportunistic encryption mechanism in mail clients and servers that could open the door to targeted man-in-the-middle (MitM) attacks, permitting an intruder to forge mailbox content and steal credentials. ...

Read More
Twitter Facebook LinkedIn
cover

Cloud Computing For Dummies, 2nd Edition ($21.00 Value) FREE for a Limited Time

Get your head--and your business--into the Cloud

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home