PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

Experts Shed Light On Distinctive Tactics Used by Hades Ransomware

mardi 15 juin 2021 à 15:05
Cybersecurity researchers on Tuesday disclosed "distinctive" tactics, techniques, and procedures (TTPs) adopted by operators of Hades ransomware that set it apart from the rest of the pack, attributing it to a financially motivated threat group called GOLD WINTER. "In many ways, the GOLD WINTER threat group is a typical post-intrusion ransomware threat group that pursues high-value targets to

Instagram‌ ‌Bug Allowed Anyone to View Private Accounts Without Following Them

mardi 15 juin 2021 à 13:12
Instagram has patched a new flaw that allowed anyone to view archived posts and stories posted by private accounts without having to follow them. "This bug could have allowed a malicious user to view targeted media on Instagram," Mayur Fartade said in a Medium post today. "An attacker could have been able to see details of private/archived posts, stories, reels, IGTV without following the user

Apple Issues Urgent Patches for 2 Zero-Day Flaws Exploited in the Wild

mardi 15 juin 2021 à 05:32
Apple on Monday shipped out-of-band security patches to address two zero-day vulnerabilities in iOS 12.5.3 that it says are being actively exploited in the wild. <!--adsense--> The latest update, iOS 12.5.4, comes with three security fixes, including a memory corruption issue in the ASN.1 decoder (CVE-2021-30737) and two flaws concerning the WebKit browser engine that could be abused to achieve

Google Workspace Now Offers Client-side Encryption For Drive and Docs

lundi 14 juin 2021 à 16:26
Google on Monday announced that it's rolling out client-side encryption to Google Workspace (formerly G Suite), thereby giving its enterprise customers direct control of encryption keys and the identity service they choose to access those keys. "With client-side encryption, customer data is indecipherable to Google, while users can continue to take advantage of Google's native web-based

NoxPlayer Supply-Chain Attack is Likely the Work of Gelsemium Hackers

lundi 14 juin 2021 à 15:34
A new cyber espionage group named Gelsemium has been linked to a supply chain attack targeting the NoxPlayer Android emulator that was disclosed earlier this year. The findings come from a systematic analysis of multiple campaigns undertaken by the APT crew, with evidence of the earliest attack dating back all the way to 2014 under the codename Operation TooHash based on malware payloads