Category: TheHackerNews

(Cyber) Risk = Probability of Occurrence x Damage
15
May
2024

(Cyber) Risk = Probability of Occurrence x Damage

Here’s How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was…

Ebury Botnet Malware
15
May
2024

Ebury Botnet Malware Compromises 400,000 Linux Servers Over Past 14 Years

A malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, out of which more than…

Tornado Cash
15
May
2024

Dutch Court Sentences Tornado Cash Co-Founder to 5 Years in Prison for Money Laundering

May 15, 2024NewsroomCryptocurrency / Anonymity A Dutch court on Tuesday sentenced one of the co-founders of the now-sanctioned Tornado Cash…

Microsoft
15
May
2024

Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days

May 15, 2024NewsroomPatch Tuesday / Vulnerability Microsoft has addressed a total of 61 new security flaws in its software as…

VMware
14
May
2024

VMware Patches Severe Security Flaws in Workstation and Fusion Products

May 14, 2024NewsroomBluetooth / Vulnerability Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be…

New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation
14
May
2024

New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation

May 14, 2024NewsroomVulnerability / Zero Day Google on Monday shipped emergency fixes to address a new zero-day flaw in the…

Cacti Framework
14
May
2024

Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code

May 14, 2024NewsroomNetwork Monitoring / Vulnerability The maintainers of the Cacti open-source network monitoring and fault management framework have addressed…

Spam Emails and Phone Calls
14
May
2024

Ongoing Campaign Bombarded Enterprises with Spam Emails and Phone Calls

Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with the goal of obtaining…

Advanced Authentication
14
May
2024

6 Mistakes Organizations Make When Deploying Advanced Authentication

May 14, 2024The Hacker NewsCyber Threat / Machine Learning Deploying advanced authentication measures is key to helping organizations address their…

Bluetooth Tracking Devices
14
May
2024

Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices

May 14, 2024NewsroomLocation Tracking / Privacy Apple and Google on Monday officially announced the rollout of a new feature that…

A Threat-Modeling Framework for Embedded Devices
13
May
2024

A Threat-Modeling Framework for Embedded Devices

May 13, 2024Newsroom The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded…

2024 Browser Security Report
13
May
2024

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

May 13, 2024The Hacker NewsBrowser Security / Data Protection With the browser becoming the most prevalent workspace in the enterprise,…