Wednesday, January 26, 2022

Hackers Exploited MSHTML Flaw to Spy on Government and Defense Targets

The Hacker News Daily Updates
Newsletter
cover

The New Cybersecurity Imperative: Cyber Governance

At the heart of the lag in cybersecurity within the healthcare industry is a lack of awareness by leaders of the potential legal and financial repercussions of a cyber attack. The only way to prevent such attacks is through proper data governance. Download the whitepaper to learn more about the emerging needs for effective cyber governance.

Download Now Sponsored
LATEST NEWS Jan 26, 2022

Initial Access Broker Involved in Log4Shell Attacks Against VMware Horizon Servers

An initial access broker group tracked as Prophet Spider has been linked to a set of malicious activities that exploits the Log4Shell vulnerability in unpatched VMware Horizon Servers. According to new research published by BlackBerry Research & Intelligence and Incident Response (IR) teams today, ...

Read More
Twitter Facebook LinkedIn

Webinar: How to See More, But Respond Less with Enhanced Threat Visibility

The subject of threat visibility is a recurring one in cybersecurity. With an expanding attack surface due to the remote work transformation, cloud and SaaS computing and the proliferation of personal devices, seeing all the threats that are continuously bombarding the company is beyond ...

Read More
Twitter Facebook LinkedIn

Join the Big Fix — Fix vulnerabilities. Earn swag.

In light of the Log4j vulnerability, we're hosting the Big Fix - a free online event where we'll all roll up our sleeves and fix our backlog of vulnerabilities together. Earn swag for each vulnerability you fix. Plus, join us for a 24-hour livestream on February ...

Read More
Twitter Facebook LinkedIn

Google Drops FLoC and Introduces Topics API to Replace Tracking Cookies for Ads

Google on Tuesday announced that it is abandoning its controversial plans for replacing third-party cookies in favor of a new Privacy Sandbox proposal called Topics, which categorizes users' browsing habits into approximately 350 topics. The new mechanism, which takes the place of FLoC (short for ...

Read More
Twitter Facebook LinkedIn

12-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access

A 12-year-old security vulnerability has been disclosed in a system utility called Polkit that grants attackers root privileges on Linux systems, even as a proof-of-concept (PoC) exploit has emerged in the wild merely hours after technical details of the bug became public. Dubbed "PwnKit" by ...

Read More
Twitter Facebook LinkedIn
cover

The New Cybersecurity Imperative: Cyber Governance

At the heart of the lag in cybersecurity within the healthcare industry is a lack of awareness by leaders of the potential legal and financial repercussions of a cyber attack. The only way to prevent such attacks is through proper data governance. Download the whitepaper to learn more about the emerging needs for effective cyber governance.

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home