PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

How to Provide Remote Incident Response During the Coronavirus Times

mardi 24 mars 2020 à 14:12
While the Coronavirus pandemic continues to strike chaos across the global economies, threat actors keep on launching cyberattacks on organizations from all sizes and verticals. IR providers face a unique challenge when approached by these organizations since, due to the Coronavirus mass quarantine, conducting incident response engagements by arriving physically to the customers' offices is

Over 50 Android Apps for Kids on Google Play Store Caught in Ad Fraud Scheme

mardi 24 mars 2020 à 11:00
More than 50 Android apps on the Google Play Store—most of which were designed for kids and had racked up almost 1 million downloads between them—have been caught using a new trick to secretly click on ads without the knowledge of smartphone users. Dubbed "Tekya," the malware in the apps imitated users' actions to click ads from advertising networks such as Google's AdMob, AppLovin',

Warning — Two Unpatched Critical 0-Day RCE Flaws Affect All Windows Versions

lundi 23 mars 2020 à 19:41
Microsoft today issued a new security advisory warning billions of Windows users of two new critical, unpatched zero-day vulnerabilities that could let hackers remotely take complete control over targeted computers. According to Microsoft, both unpatched flaws are being used in limited, targeted attacks and impact all supported versions of the Windows operating system—including Windows 10, 8.1

User Survey 2020 Report Shows Rapid Growth In Apache Pulsar Adoption

lundi 23 mars 2020 à 10:10
For the first time ever, the Apache Pulsar PMC team is publishing a user survey report. The 2020 Apache Pulsar User Survey Report reveals Pulsar's accelerating rate of global adoption, details how organizations are leveraging Pulsar to build real-time streaming applications, and highlights key features on Pulsar's product roadmap. Apache Pulsar is a cloud-native, distributed open source

Multiple DDoS Botnets Exploited 0-Day Flaws in LILIN DVR Surveillance Systems

samedi 21 mars 2020 à 09:36
Multiple zero-day vulnerabilities in digital video recorders (DVRs) for surveillance systems manufactured by Taiwan-based LILIN have been exploited by botnet operators to infect and co-opt vulnerable devices into a family of denial-of-service bots. The findings come from Chinese security firm Qihoo 360's Netlab team, who say different attack groups have been using LILIN DVR zero-day