PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

Here's A New Forum for Cybersecurity Leaders Outside of the Fortune 2000

vendredi 30 avril 2021 à 10:08
Perhaps due to the nature of the position, the InfoSec leadership roles tend to be solitary ones. CISOs, or their equivalent decision-makers in organizations without the role, have so many constant drains on their attention – keeping their knowledge fresh, building plans to secure their organizations further – that they often find themselves on an island. It’s even more challenging for

Passwordstate Warns of Ongoing Phishing Attacks Following Data Breach

vendredi 30 avril 2021 à 09:24
Click Studios, the Australian software firm which confirmed a supply chain attack affecting its Passwordstate password management application, has warned customers of an ongoing phishing attack by an unknown threat actor. "We have been advised a bad actor has commenced a phishing attack with a small number of customers having received emails requesting urgent action," the company said in an

A New PHP Composer Bug Could Enable Widespread Supply-Chain Attacks

jeudi 29 avril 2021 à 17:15
The maintainers of Composer, a package manager for PHP, have shipped an update to address a critical vulnerability that could have allowed an attacker to execute arbitrary commands and "backdoor every PHP package," resulting in a supply-chain attack. Tracked as CVE-2021-29472, the security issue was discovered and reported on April 22 by researchers from SonarSource, following which a hotfix was

LuckyMouse Hackers Target Banks, Companies and Governments in 2020

jeudi 29 avril 2021 à 16:46
An adversary known for its watering hole attacks against government entities has been linked to a slew of newly detected intrusions targeting various organizations in Central Asia and the Middle East. The malicious activity, collectively named "EmissarySoldier," has been attributed to a threat actor called LuckyMouse, and is said to have happened in 2020 with the goal of obtaining geopolitical

How to Conduct Vulnerability Assessments: An Essential Guide for 2021

jeudi 29 avril 2021 à 12:31
Hackers are scanning the internet for weaknesses all the time, and if you don't want your organization to fall victim, you need to be the first to find these weak spots. In other words, you have to adopt a proactive approach to managing your vulnerabilities, and a crucial first step in achieving this is performing a vulnerability assessment. Read this guide to learn how to perform vulnerability