Category: TheHackerNews

End-to-End Encryption
22
May
2024

Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings

May 22, 2024NewsroomEncryption / Quantum Computing Popular enterprise services provider Zoom has announced the rollout of post-quantum end-to-end encryption (E2EE)…

QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances
22
May
2024

QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances

May 22, 2024NewsroomData Security / Vulnerability Taiwanese company QNAP has rolled out fixes for a set of medium-severity flaws impacting…

Veeam Backup Enterprise Manager
22
May
2024

Critical Veeam Backup Enterprise Manager Flaw Allows Authentication Bypass

May 22, 2024NewsroomEnterprise Security / Vulnerability Users of Veeam Backup Enterprise Manager are being urged to update to the latest…

GitHub Enterprise Server
21
May
2024

Critical GitHub Enterprise Server Flaw Allows Authentication Bypass

May 21, 2024NewsroomVulnerability / Software Development GitHub has rolled out fixes to address a maximum severity flaw in the GitHub…

New Phishing Attack
21
May
2024

Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users

May 21, 2024NewsroomCloud Security / Data Security A new attack campaign dubbed CLOUD#REVERSER has been observed leveraging legitimate cloud storage…

SolarMarker Malware
21
May
2024

SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure

May 21, 2024NewsroomData Breach / Malware The persistent threat actors behind the SolarMarker information-stealing malware have established a multi-tiered infrastructure…

Wazuh FIM Capability
21
May
2024

Streamlining IT Security Compliance Using the Wazuh FIM Capability

File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps…

Five Core Tenets Of Highly Effective DevSecOps Practices
21
May
2024

Five Core Tenets Of Highly Effective DevSecOps Practices

One of the enduring challenges of building modern applications is to make them more secure without disrupting high-velocity DevOps processes…

AI Models and PDF.js
21
May
2024

Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox

May 21, 2024NewsroomSupply Chain Security / AI Model A critical security flaw has been disclosed in the llama_cpp_python Python package…

Windows 11
21
May
2024

Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses

May 21, 2024NewsroomWindows 11 Security Microsoft on Monday confirmed its plans to deprecate NT LAN Manager (NTLM) in Windows 11…

NextGen Healthcare Mirth
21
May
2024

NextGen Healthcare Mirth Connect Under Attack

May 21, 2024NewsroomHealthcare / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting…

Fluent Bit Vulnerability
21
May
2024

“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit

May 21, 2024NewsroomCyber Attack / API Security Cybersecurity researchers have discovered a critical security flaw in a popular logging and…