Monday, August 22, 2022

Google Cloud Blocks Record DDoS attack of 46 Million Requests Per Second

The Hacker News Daily Updates
Newsletter
cover

Two-Factor Authentication is Broken. Let's Fix It.

SMS one-time passcodes are putting your customers at risk--biometric authentication is the answer.

Download Now Sponsored
LATEST NEWS Aug 22, 2022

"As Nasty as Dirty Pipe" — 8 Year Old Linux Kernel Vulnerability Uncovered

Details of an eight-year-old security vulnerability in the Linux kernel have emerged that the researchers say is "as nasty as Dirty Pipe." Dubbed DirtyCred by a group of academics from Northwestern University, the security weakness exploits a previously unknown flaw (CVE-2022-2588) to escalate ...

Read More
Twitter Facebook LinkedIn

Meet Borat RAT, a New Unique Triple Threat

Atlanta-based cyber risk intelligence company, Cyble discovered a new Remote Access Trojan (RAT) malware. What makes this particular RAT malware distinct enough to be named after the comic creation of Sacha Baron Cohen? RAT malware typically helps cybercriminals gain complete control of a victim's ...

Read More
Twitter Facebook LinkedIn

Better than Google Authenticator

Daito is your team's new web-based 2FA authenticator. Securely share access with others, no phone neeed. Backups included.

Read More
Twitter Facebook LinkedIn

RTLS Systems Found Vulnerable to MiTM Attacks and Location Tampering

Researchers have disclosed multiple vulnerabilities impacting Ultra-wideband (UWB) Real-time Locating Systems (RTLS), enabling threat actors to launch adversary-in-the-middle (AitM) attacks and tamper with location data. "The zero-days found specifically pose a security risk for workers in ...

Read More
Twitter Facebook LinkedIn

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability

Bitcoin ATM manufacturer General Bytes confirmed that it was a victim of a cyberattack that exploited a previously unknown flaw in its software to plunder cryptocurrency from its users. "The attacker was able to create an admin user remotely via CAS administrative interface via a URL call on the ...

Read More
Twitter Facebook LinkedIn
cover

Remote Work and Data Privacy for Employees

Why Employees Must Take a Proactive Approach to Protect Workers’ Personal Information in a Post-Pandemic World

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home