PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

Windows 10, iOS, Chrome, Firefox and Others Hacked at Tianfu Cup Competition

lundi 9 novembre 2020 à 08:59
Multiple software products from Adobe, Apple, Google, Microsoft, Mozilla, and Samsung were successfully pwned with previously unseen exploits in Tianfu Cup 2020, the third edition of the international cybersecurity contest held in the city of Chengdu, China. "Many mature and hard targets have been pwned on this year's contest," the event organizers said. "11 out of 16 targets cracked with 23

Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered

vendredi 6 novembre 2020 à 08:48
Apple on Thursday released multiple security updates to patch three zero-day vulnerabilities that were revealed as being actively exploited in the wild. Rolled out as part of its iOS, iPadOS, macOS, and watchOS updates, the flaws reside in the FontParser component and the kernel, allowing adversaries to remotely execute arbitrary code and run malicious programs with kernel-level privileges. The

North Korean Hackers Used 'Torisma' Spyware in Job Offers-based Attacks

jeudi 5 novembre 2020 à 20:33
A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims' machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought. The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and defense contractors based in Russia

Premium-Rate Phone Fraudsters Hack VoIP Servers of 1200 Companies

jeudi 5 novembre 2020 à 11:18
Cybersecurity researchers today took the wraps off an on-going cyber fraud operation led by hackers in Gaza, West Bank, and Egypt to compromise VoIP servers of more than 1,200 organizations across 60 countries over the past 12 months. According to findings published by Check Point Research, the threat actors — believed to be located in the Palestinian Gaza Strip — have targeted Sangoma PBX, an

Deception Technology: No Longer Only A Fortune 2000 Solution

jeudi 5 novembre 2020 à 10:08
A cyber-attacker successfully breaks into your environment and begins sneaking around to find something valuable - intellectual property, bank account credentials, company plans, whatever. The attacker makes his way to a certain host on a network node to browse the directories, and suddenly, his connection is cut off. The stolen username and password he acquired no longer works.  Unknowingly,