Forwarded from The Hacker News
🔑 Is Your Password Hash Secure Enough? Modern attackers use GPU-powered tools to crack even long, complex passwords protected by weak algorithms.
Don’t leave your passwords exposed. Discover how to defeat password-cracking tools and protect your accounts: https://thehackernews.com/2025/01/how-long-does-it-take-hackers-to-crack.html
Don’t leave your passwords exposed. Discover how to defeat password-cracking tools and protect your accounts: https://thehackernews.com/2025/01/how-long-does-it-take-hackers-to-crack.html
Forwarded from The Hacker News
🚨 ALERT: Cybercriminals are hijacking ESXi systems to tunnel traffic and remain hidden on networks for extended periods.
Native tools like SSH allow attackers to blend in with legitimate traffic, bypassing detection and making it nearly impossible to spot them.
Read: https://thehackernews.com/2025/01/ransomware-targets-esxi-systems-via.html
Native tools like SSH allow attackers to blend in with legitimate traffic, bypassing detection and making it nearly impossible to spot them.
Read: https://thehackernews.com/2025/01/ransomware-targets-esxi-systems-via.html
Forwarded from The Hacker News
The #1 threat to technical work at scale is poor communication.
A study conducted by Harvard University, the Carnegie Foundation, and Stanford Research Center found that 85% of job success comes from soft skills (such as people skills), whereas only 15% stems from hard skills (such as technical capabilities).
Soft skills can distinguish you to help preserve or even further your career, but if they’re not developed, they can create a ceiling over your growth.
Whether sharing status updates on a virtual standup meeting or delivering a keynote tech talk at an in-person conference, how you communicate your work can either fuel its growth or snuff out its success.
If you’re looking to improve your communication and presentation skills, look no further than the new book, Luminary: Master the Art and Science of Storytelling for Technical Professionals.
Learn more about the book and how it can help you and your work advance here: https://thn.news/storytelling-technical-professionals
A study conducted by Harvard University, the Carnegie Foundation, and Stanford Research Center found that 85% of job success comes from soft skills (such as people skills), whereas only 15% stems from hard skills (such as technical capabilities).
Soft skills can distinguish you to help preserve or even further your career, but if they’re not developed, they can create a ceiling over your growth.
Whether sharing status updates on a virtual standup meeting or delivering a keynote tech talk at an in-person conference, how you communicate your work can either fuel its growth or snuff out its success.
If you’re looking to improve your communication and presentation skills, look no further than the new book, Luminary: Master the Art and Science of Storytelling for Technical Professionals.
Learn more about the book and how it can help you and your work advance here: https://thn.news/storytelling-technical-professionals
Forwarded from The Hacker News
Media is too big
VIEW IN TELEGRAM
⚔️ Prepare for battle. Defend your network. Master your craft.
At SANS live training events, you'll:
✅ Train with cybersecurity legends
✅ Get hands-on with real-world threats
✅ Build your future with certifications
🎯 Find your next event: 👉 https://thn.news/sans-training-tel
#SANSLiveTraining #SANS
At SANS live training events, you'll:
✅ Train with cybersecurity legends
✅ Get hands-on with real-world threats
✅ Build your future with certifications
🎯 Find your next event: 👉 https://thn.news/sans-training-tel
#SANSLiveTraining #SANS
Forwarded from The Hacker News
🚨 Cybersecurity experts discovered a flaw in a popular travel service that let hackers hijack accounts with a simple click.
Attackers could impersonate victims, book travel, and even use loyalty points!
Learn how: https://thehackernews.com/2025/01/oauth-redirect-flaw-in-airline-travel.html
Attackers could impersonate victims, book travel, and even use loyalty points!
Learn how: https://thehackernews.com/2025/01/oauth-redirect-flaw-in-airline-travel.html
Forwarded from The Hacker News
⚠️ A new phishing email campaign is taking over Poland & Germany, using fake order receipts to infect machines with Agent Tesla, Snake Keylogger, and TorNet malware.
Read the full story: https://thehackernews.com/2025/01/purecrypter-deploys-agent-tesla-and-new.html
Read the full story: https://thehackernews.com/2025/01/purecrypter-deploys-agent-tesla-and-new.html
Forwarded from The Hacker News
🔒 SOCs Drowning in Alerts? AI-powered SOC Analysts now triage & investigate within MINUTES!
Speed, accuracy, and efficiency—ALL in one solution, reducing breach impact and costs.
Find out how AI is transforming SOCs: https://thehackernews.com/2025/01/ai-soc-analysts-propelling-secops-into.html
Speed, accuracy, and efficiency—ALL in one solution, reducing breach impact and costs.
Find out how AI is transforming SOCs: https://thehackernews.com/2025/01/ai-soc-analysts-propelling-secops-into.html
Forwarded from The Hacker News
🚨 URGENT: Critical Zero-Day Alert!
Thousands of Zyxel CPE devices are being actively exploited by attackers. Over 1,500 devices exposed globally.
⤷ Limit admin access
⤷ Filter traffic for unusual requests
🔗 Read: https://thehackernews.com/2025/01/zyxel-cpe-devices-face-active.html
Thousands of Zyxel CPE devices are being actively exploited by attackers. Over 1,500 devices exposed globally.
⤷ Limit admin access
⤷ Filter traffic for unusual requests
🔗 Read: https://thehackernews.com/2025/01/zyxel-cpe-devices-face-active.html
Forwarded from The Hacker News
🚨 WATCH OUT: A new vulnerability, CVE-2025-22217, in VMware Avi Load Balancer could give attackers full access to your databases!
No workarounds—only updates will protect you.
Running affected versions? Learn more: https://thehackernews.com/2025/01/broadcom-warns-of-high-severity-sql.html
No workarounds—only updates will protect you.
Running affected versions? Learn more: https://thehackernews.com/2025/01/broadcom-warns-of-high-severity-sql.html
Forwarded from The Hacker News
🛑 UAC-0063 has been using stolen documents from Kazakhstan’s Ministry of Foreign Affairs to spear-phish targets and deploy HATVIBE malware.
👉 Read the full details on UAC-0063’s evolving tactics: https://thehackernews.com/2025/01/uac-0063-expands-cyber-attacks-to.html
👉 Read the full details on UAC-0063’s evolving tactics: https://thehackernews.com/2025/01/uac-0063-expands-cyber-attacks-to.html
Forwarded from The Hacker News
⚠️ A critical flaw (CVE-2025-22604) in Cacti could lead to remote code execution. If exploited, authenticated attackers could steal or manipulate sensitive data.
Patch to version 1.2.29 to fix this flaw and protect your systems.
Learn more: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
Patch to version 1.2.29 to fix this flaw and protect your systems.
Learn more: https://thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
Forwarded from The Hacker News
🚨 Apple Silicon CPUs hit by 2 new vulnerabilities: SLAP & FLOP
These attacks target Load Address and Load Value Predictors in Apple CPUs, risking exposure of your:
⤷ Location history
⤷ Calendar events
⤷ Sensitive data
🔗 Read: https://thehackernews.com/2025/01/new-slap-flop-attacks-expose-apple-m.html
These attacks target Load Address and Load Value Predictors in Apple CPUs, risking exposure of your:
⤷ Location history
⤷ Calendar events
⤷ Sensitive data
🔗 Read: https://thehackernews.com/2025/01/new-slap-flop-attacks-expose-apple-m.html
Forwarded from The Hacker News
🔥 AI isn’t just a trend in cybersecurity—it’s already reshaping how teams defend against threats.
But are we fully prepared to tackle its challenges?
In this latest #webinar, you’ll discover:
⤷ Real insights from 200 cybersecurity professionals using AI today
⤷ What’s working & what’s not in the world of AI-driven security
⤷ The real hurdles—data issues, transparency, and more
👨💻 Join Now and discover how to make AI work harder for you: https://thehackernews.com/2025/01/ai-in-cybersecurity-whats-effective-and.html
But are we fully prepared to tackle its challenges?
In this latest #webinar, you’ll discover:
⤷ Real insights from 200 cybersecurity professionals using AI today
⤷ What’s working & what’s not in the world of AI-driven security
⤷ The real hurdles—data issues, transparency, and more
👨💻 Join Now and discover how to make AI work harder for you: https://thehackernews.com/2025/01/ai-in-cybersecurity-whats-effective-and.html
Forwarded from 5 smooth stones
Substack
Trump Announces $500 Billion For Obsolete Technology
Even Trump cannot outrun Moore's Law
I like this video as this guy lived in china 14 years and tells the real story... https://youtu.be/jjWairkG9lw
YouTube
Rednote is Showing Americans how much Better China is
Secure your privacy with Surfshark! Enter coupon code serpentza for 4 extra months at https://Surfshark.com/serpentza
The veil has been lifted!
Join me for the China Show, a weekly dive into what's happening in China: https://www.youtube.com/advpodcasts…
The veil has been lifted!
Join me for the China Show, a weekly dive into what's happening in China: https://www.youtube.com/advpodcasts…
Sony BMG Rootkit Scandal: 10 Years Later | CSO Online
https://www.csoonline.com/article/553369/sony-bmg-rootkit-scandal-10-years-later.html
https://www.csoonline.com/article/553369/sony-bmg-rootkit-scandal-10-years-later.html
CSO Online
Sony BMG Rootkit Scandal: 10 Years Later
Hackers really have had their way with Sony over the past year, taking down its Playstation Network last Christmas Day and creating an international incident by exposing confidential data from Sony Pictures Entertainment in response to The Interview comedy…
From the above Article. "Not detectable by Anti-Virus .." What does rhat tell you about commercial antivirus, and their av definitions, and the ability of either rich corporate or government entities to buy off the Antivirus company, and to whitelist their malware within the antivirus program. Its all a HUGE scam.
dBpoweramp: mp3 Converter, CD Ripper, FLAC, Apple Lossless, WAV, AAC, AIFF. Fix album art, Asset UPnP Server
https://www.dbpoweramp.com/
https://www.dbpoweramp.com/
Dbpoweramp
dBpoweramp: mp3 Converter, CD Ripper, FLAC, Apple Lossless. PerfectTUNES: fixes album art. Asset UPnP Server. Video and Image Converter.
dBpoweramp: mp3 converter, FLAC, WAV, AAC and Apple Losslesss. CD Ripper, Album Art, Asset UPnP Server, Image Converter, Video Converter, PerfectTUNES, AccurateRip
Privacy + Secure Tech Corner Channel 🛡️
dBpoweramp: mp3 Converter, CD Ripper, FLAC, Apple Lossless, WAV, AAC, AIFF. Fix album art, Asset UPnP Server https://www.dbpoweramp.com/
dBpoweramp Forum
dbPoweramp on Linux -
dBpoweramp Forum
dBpoweramp Forum
Registered user that doesn't keep a copy of windows hanging around but for dbPoweramp. I see some of the toolset starting to emerge on Mac. Are there plans for a Linux compatible toolset?
Forwarded from Mishaal's Android News Feed
🕶Android 16 prepares to make dark mode work with more apps
Android may add a new feature that automatically converts light theme apps to dark theme, even if they don't have a native dark theme.
Details + screenshots can be found at the link👇
🔗 https://www.androidauthority.com/android-16-forced-dark-mode-3521090/
Android may add a new feature that automatically converts light theme apps to dark theme, even if they don't have a native dark theme.
Details + screenshots can be found at the link👇
🔗 https://www.androidauthority.com/android-16-forced-dark-mode-3521090/
Android Authority
Android 16 prepares to make dark mode work with more apps
Google is working on a new feature for Android 16 that automatically puts apps into dark mode, even if they don't support it.