PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

Everything You Need to Know About Evolving Threat of Ransomware

mercredi 24 février 2021 à 13:32
The cybersecurity world is constantly evolving to new forms of threats and vulnerabilities. But ransomware proves to be a different animal—most destructive, persistent, notoriously challenging to prevent, and is showing no signs of slowing down. Falling victim to a ransomware attack can cause significant data loss, data breach, operational downtime, costly recovery, legal consequences, and

Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now

mercredi 24 février 2021 à 08:54
VMware has addressed multiple critical remote code execution (RCE) vulnerabilities in VMware ESXi and vSphere Client virtual infrastructure management platform that may allow attackers to execute arbitrary commands and take control of affected systems. "A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying

Experts Find a Way to Learn What You're Typing During Video Calls

mardi 23 février 2021 à 14:37
A new attack framework aims to infer keystrokes typed by a target user at the opposite end of a video conference call by simply leveraging the video feed to correlate observable body movements to the text being typed. The research was undertaken by Mohd Sabra, and Murtuza Jadliwala from the University of Texas at San Antonio and Anindya Maiti from the University of Oklahoma, who say the attack

5 Security Lessons for Small Security Teams for the Post COVID19 Era

mardi 23 février 2021 à 12:01
A full-time mass work from home (WFH) workforce was once considered an extreme risk scenario that few risk or security professionals even bothered to think about. Unfortunately, within a single day, businesses worldwide had to face such a reality. Their 3-year long digital transformation strategy was forced to become a 3-week sprint during which offices were abandoned, and people started working

Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs

mardi 23 février 2021 à 11:46
Researchers have demonstrated a novel class of attacks that could allow a bad actor to potentially circumvent existing countermeasures and break the integrity protection of digitally signed PDF documents. Called "Shadow attacks" by academics from Ruhr-University Bochum, the technique uses the "enormous flexibility provided by the PDF specification so that shadow documents remain