Friday, January 7, 2022

North Korean Hackers Start New Year with Attacks on Russian Foreign Ministry

The Hacker News Daily Updates
Newsletter
cover

Discover Today's Secret to Ransomware Recovery

Cyber threats continue to challenge the resilience of every organization. Led by industry experts, our essential webinar will show you how you can maintain quality backup data to experience ultimate cyber resiliency in today’s climate.

Download Now Sponsored
LATEST NEWS Jan 7, 2022

Log4Shell-like Critical RCE Flaw Discovered in H2 Database Console

Researchers have disclosed a security flaw affecting H2 database consoles that could result in remote code execution in a manner that echoes the Log4j "Log4Shell" vulnerability that came to light last month. The issue, tracked as CVE-2021-42392, is the " first critical issue published since ...

Read More
Twitter Facebook LinkedIn

France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies

The Commission nationale de l'informatique et des libertés (CNIL), France's data protection watchdog, has slapped Facebook (now Meta Platforms) and Google with fines of €150 million ($170 million) and €60 million ($68 million) for violating E.U. privacy rules by failing to provide users with an ...

Read More
Twitter Facebook LinkedIn

North Korean Hackers Start New Year with Attacks on Russian Foreign Ministry

A North Korean cyberespionage group named Konni has been linked to a series of targeted attacks aimed at the Russian Federation's Ministry of Foreign Affairs (MID) with New Year lures to compromise Windows systems with malware. "This activity cluster demonstrates the patient and persistent nature ...

Read More
Twitter Facebook LinkedIn

NIST Cybersecurity Framework: A Quick Guide for SaaS Security Compliance

When I want to know the most recently published best practices in cyber security, I visit The National Institute of Standards and Technology (NIST). From the latest password requirements (NIST 800-63) to IoT security for manufacturers (NISTIR 8259), NIST is always the starting point. NIST plays a ...

Read More
Twitter Facebook LinkedIn

New Trick Could Let Malware Fake iPhone Shutdown to Spy on Users Secretly

Researchers have disclosed a novel technique by which malware on iOS can achieve persistence on an infected device by faking its shutdown process, making it impossible to physically determine if an iPhone is off or otherwise. The discovery — dubbed "NoReboot" — comes courtesy of mobile security ...

Read More
Twitter Facebook LinkedIn
cover

Discover Today's Secret to Ransomware Recovery

Cyber threats continue to challenge the resilience of every organization. Led by industry experts, our essential webinar will show you how you can maintain quality backup data to experience ultimate cyber resiliency in today’s climate.

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home