Forwarded from The Hacker News
🚨 Cisco has issued updates for CVE-2024-20418, a critical vulnerability in Ultra-Reliable Wireless Backhaul Access Points (CVSS: 10.0) that allows unauthorized root command execution.
Read: https://thehackernews.com/2024/11/cisco-releases-patch-for-critical-urwb.html
Update to version 17.15.1 ASAP to protect your network!
Read: https://thehackernews.com/2024/11/cisco-releases-patch-for-critical-urwb.html
Update to version 17.15.1 ASAP to protect your network!
Forwarded from The Hacker News
💻🔑 Developers, beware!
A malicious package named "fabrice" has been discovered on PyPI, stealthily stealing AWS credentials for over three years.
With more than 37,100 downloads, this typosquatting threat poses serious risks.
Read: https://thehackernews.com/2024/11/malicious-pypi-package-fabrice-found.html
A malicious package named "fabrice" has been discovered on PyPI, stealthily stealing AWS credentials for over three years.
With more than 37,100 downloads, this typosquatting threat poses serious risks.
Read: https://thehackernews.com/2024/11/malicious-pypi-package-fabrice-found.html
Forwarded from The Hacker News
🚨 Cyber alert: The CopyRh(ight)adamantys phishing campaign is leveraging copyright themes to spread the Rhadamanthys stealer, while Kaspersky reveals SteelFox #malware, exploiting vulnerable drivers for data theft.
Learn more: https://thehackernews.com/2024/11/steelfox-and-rhadamanthys-malware-use.html
Learn more: https://thehackernews.com/2024/11/steelfox-and-rhadamanthys-malware-use.html
Forwarded from The Hacker News
🚨 MirrorFace, the China-aligned hacker group, has targeted a European diplomatic organization for the first time, using a phishing attack linked to the upcoming World Expo in 2025.
Read the full report: https://thehackernews.com/2024/11/china-aligned-mirrorface-hackers-target.html
Read the full report: https://thehackernews.com/2024/11/china-aligned-mirrorface-hackers-target.html
Forwarded from The Hacker News
North Korean hackers are ramping up attacks on crypto firms with a sophisticated #malware campaign.
Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.
Read more — https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.
Read more — https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
Forwarded from The Hacker News
🔒💻 Cybercriminals are exploiting techniques like disabling Windows Event Logging to bypass security measures.
This tactic allows them to operate undetected, putting your organization at risk.
Learn how 👉 https://thehackernews.com/2024/11/5-most-common-malware-techniques-in-2024.html
This tactic allows them to operate undetected, putting your organization at risk.
Learn how 👉 https://thehackernews.com/2024/11/5-most-common-malware-techniques-in-2024.html
Forwarded from The Hacker News
🔒 Weak passwords continue to be a major vulnerability for organizations. With hackers able to crack simple passwords in seconds, it’s time to reassess your security measures!
🛡️ Learn how to reinforce your defenses—read more here: https://thehackernews.com/2024/11/a-hackers-guide-to-password-cracking.html
🛡️ Learn how to reinforce your defenses—read more here: https://thehackernews.com/2024/11/a-hackers-guide-to-password-cracking.html
Forwarded from The Hacker News
🚨 Can your SOC keep pace with the growing number of security threats?
The 2024 State of Threat Detection Report reveals:
✓ Over 50% can't keep up with rising threats
✓ 71% say vendors must own breach failures
✓ 89% are turning to AI-powered tools
Is it a threat detection problem or an attack signal problem?
👉 Find out now. Download the free report: https://thn.news/state-of-threat-detection-2024
The 2024 State of Threat Detection Report reveals:
✓ Over 50% can't keep up with rising threats
✓ 71% say vendors must own breach failures
✓ 89% are turning to AI-powered tools
Is it a threat detection problem or an attack signal problem?
👉 Find out now. Download the free report: https://thn.news/state-of-threat-detection-2024
www.vectra.ai
2024 State of Threat Detection
Discover the 2024 State of Threat Detection report insights, highlighting security team challenges, AI adoption, and vendor responsibility in enhancing cyber defense.
Forwarded from Mishaal's Android News Feed
If you rely on the Termux app on Android for anything and daily drive a OnePlus, OPPO, or Realme device, heads up: the OxygenOS 15/ColorOS 15 update seems to be killing off Termux processes, but only if you install the app from outside the Play Store.
It seems this issue doesn't happen if you install Termux from the Play Store, as the Play Store version uses a hack that seemingly doesn't get detected and thus its processes don't get killed off.
More details can be found in this Reddit thread.
In addition, there seems to be an ongoing issue with running Linux packages via PRoot, with users seeing a message that says a "malicious app" attempted to damage their phone.
It seems this issue doesn't happen if you install Termux from the Play Store, as the Play Store version uses a hack that seemingly doesn't get detected and thus its processes don't get killed off.
More details can be found in this Reddit thread.
In addition, there seems to be an ongoing issue with running Linux packages via PRoot, with users seeing a message that says a "malicious app" attempted to damage their phone.
Reddit
From the termux community on Reddit: [ANNOUNCEMENT] Termux Broken On Android 15 For OnePlus Devices
Explore this post and more from the termux community
Forwarded from Mishaal's Android News Feed
Google has rebranded its Data Restore Tool app to Android Switch. There's also a new icon!
I'm normally not a fan of minimalist icons, but I think this one is quite clever: The blue bubbles change to green bubbles.
H/T Jason Lim
I'm normally not a fan of minimalist icons, but I think this one is quite clever: The blue bubbles change to green bubbles.
H/T Jason Lim
Forwarded from Mishaal's Android News Feed
🔘Android may soon make it easier to bring back the floating accessibility menu
The new "Drag to Hide" feature will show a notification that, when tapped, brings back the floating button that opens accessibility menu.
More details + screenshots can be found in this article.
The new "Drag to Hide" feature will show a notification that, when tapped, brings back the floating button that opens accessibility menu.
More details + screenshots can be found in this article.
Android Authority
Android may soon make it easier to bring back the floating accessibility menu
Android may soon show a notification when you dismiss the floating accessibility menu button that makes it easier to restore the button.
Forwarded from Treble GSI's | Privacy + Secure
YouTube
Linux Mint Nightlight and Other Updates
Linux Mint has some new news for the upcoming cinnamon desktop. We will look at that and the exciting news about a new deal with a computer company.
#mint #cinnamon #linux
Post:
https://blog.linuxmint.com/?p=4762
-----------
Support Switched to Linux!
👥…
#mint #cinnamon #linux
Post:
https://blog.linuxmint.com/?p=4762
-----------
Support Switched to Linux!
👥…
Forwarded from Treble GSI's | Privacy + Secure
YouTube
10GbE for Everyone The Must-Have $199 10Gbase-T Switch
The MikroTik CRS304-4XG-IN is a $199 or less switch that is both low power and fanless. This is a switch you are going to get one, or perhaps more than one of.
STH Main Site Article: https://www.servethehome.com/mikrotik-crs304-4xg-in-review-this-is-a-must…
STH Main Site Article: https://www.servethehome.com/mikrotik-crs304-4xg-in-review-this-is-a-must…
Forwarded from Hacker News
charliegerard.dev
Hacking cars in JavaScript (Running replay attacks in the browser with the HackRF) | Charlie Gerard | Senior frontend developer…
Collection of side projects, conference talks and blog posts experimenting with frontend technologies and human-computer interaction
Forwarded from Hacker News
purplesyringa's blog
Bringing faster exceptions to Rust
Three months ago, I wrote about why you might want to use panics for error handling. Even though it’s a catchy title, panics are hardly suited for this goal, even if you try to hack around with macros and libraries. The real star is the unwinding mechanism…
Forwarded from Hacker News