Monday, July 11, 2022

Hackers Used Fake Job Offer to Steal $540 Million from Axie Infinity

The Hacker News Daily Updates
Newsletter
cover

Checklist for Evaluating Your Enterprise Identity Security Posture

This checklist will help organizations understand identity and entitlement risks across their networks from endpoints to Active Directory to the cloud.

Download Now Sponsored
LATEST NEWS Jul 11, 2022

What It Takes to Tackle Your SaaS Security

It's not a new concept that Office 365, Salesforce, Slack, Google Workspace or Zoom, etc., are amazing for enabling the hybrid workforce and hyper-productivity in businesses today. However, there are three main challenges that have arisen stemming from this evolution: (1) While SaaS apps include a ...

Read More
Twitter Facebook LinkedIn

Hackers Used Fake Job Offer to Hack and Steal $540 Million from Axie Infinity

The $540 million hack of Axie Infinity's Ronin Bridge in late March 2022 was the consequence of one of its former employees getting tricked by a fraudulent job offer on LinkedIn, it has emerged.  According to a report from The Block published last week citing two people familiar with the matter, a ...

Read More
Twitter Facebook LinkedIn

Set Up, Manage & Secure Apple Devices in Minutes

Jamf Now sets up and secures your team's Apple devices so you can get back to more creative work. If you need more power, the Jamf Fundamentals plan is an enhanced offering with all the functionality of Jamf Now plus Malware Protection. Sign up and manage up to 3 devices for ...

Read More
Twitter Facebook LinkedIn

PyPI Repository Makes 2FA Security Mandatory for Critical Python Projects

The maintainers of the official third-party software repository for Python have begun imposing a new two-factor authentication (2FA) condition for projects deemed "critical." "We've begun rolling out a 2FA requirement: soon, maintainers of critical projects must have 2FA enabled to publish, ...

Read More
Twitter Facebook LinkedIn

Hackers Exploiting Follina Bug to Deploy Rozena Backdoor

A newly observed phishing campaign is leveraging the recently disclosed Follina security vulnerability to distribute a previously undocumented backdoor on Windows systems. "Rozena is a backdoor malware that is capable of injecting a remote shell connection back to the attacker's machine," Fortinet ...

Read More
Twitter Facebook LinkedIn
cover

The Wolf in Sheep's Clothing: How Low-Risk Exposures Lead to Destructive Attacks

The Nature of Modern Adversaries

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home