thehackernewz
thehackernewz
The Hacker Newz
20 posts
Hacker News is the leading news service focused on discovering trending and latest news and quality articles on Cyber Security, Hacking, Information Security, Computer Security, Cyber Crime, Ethical Hacking and Technology.  
Don't wanna be here? Send us removal request.
thehackernewz · 3 years ago
Text
Exposure of Customer Contact Information Made By the Microsoft Data Breach
The exposure of the customer’s private information by the data breach made in microsoft as it was said and confirmed by microsoft that exposure of some of its customer sensitive information was made by the means of a server of microsoft which was having the misconfiguration on the server of the microsoft due which it became easily accessible over the internet.
0 notes
thehackernewz · 3 years ago
Text
Increasing Number of Phishing Scams Made Through Call Back Attack
A surprising technique of phishing that quite helping to make the victims be able to be coaxed into making the victims be fallen into the trap by making downloading malicious files onto their devices along with the ransomware included.
0 notes
thehackernewz · 3 years ago
Text
Active Exploitation of Vulnerability in the Wild by Zimbra Remote Code Execution
The active exploitation of the vulnerability made in the wild inside the zero-day remote code execution (RCE). There is one of the better news for the users of Ubuntu users thus making the installation of the Pax by default in Ubuntu 20.04, and in Ubuntu 18.04 thus making the issuance of a custom patch issued for protection by cpio.
0 notes
thehackernewz · 3 years ago
Text
Confirmation of Zero-Day Exploit Provided By the Microsoft against the Limited Attacks Made On Their Exchange Server
The claimed confirmation given by Microsoft about the zero-day exploit which was made by the attackers for making the limited attacks that were made on their exchange server in which the patches are developed for making the protection against the two active exploitation by the vulnerabilities.
0 notes
thehackernewz · 3 years ago
Text
Packagist Component of Php Package Manager Vulnerable To Compromise
One of the vulnerability compromises found in the Packagist component of the PHP package manager thus making the attack which is possibly made. One of the most important components of Composer i.e. the main package manager for PHP applications was having a vulnerability.
0 notes
thehackernewz · 3 years ago
Text
Allowance of Files Deletion from the Server from Complete FTP Path Traversal
The security vulnerability which was found in the file transfer software in which the allowance is given to the Complete FTP unauthenticated attackers for making the deletion of the arbitrary files which are present on the installations which are affected.
0 notes
thehackernewz · 3 years ago
Text
Vulenerabilities Reported Inside Zoom Biggest Corporate Meet Video App By Cert
Discussion about the vulnerabilities reported by CERT inside the biggest corporate meeting application on which millions of meetings takes place around the globe. So, without any much overdoing the things let’s start.
0 notes
thehackernewz · 3 years ago
Text
Clash of Govt of Australia and Optus over the amid Reports of Cyber Attack
The Clash whose occurrence was due to the report of a cyber attack among the Govt. of Australia and OPTUS and has been in the hot news of the cyber world thus getting viral due to the higher criticalness of the issues.
0 notes
thehackernewz · 3 years ago
Text
Patching of Firewall Causing the Flaw in Web Security
To Throw Some Light On The Most Threatening News Of The Cyber World Era Which Is A Highly Vulnerable Threat In Which The Patching Of The Firewall Thus Making The Flaws In The Real-Time Web Security Making It Quiet For Hackers.
0 notes
thehackernewz · 3 years ago
Text
Follina Vulnerability Identification as the Brain Of Cyclops Blink A New Modular Botnet For Ensalving Routers Of Watch Guard and Asus
Continuation of the attack made by the Russian malware having the name sandworm whose affiliate UAC-0113 made the targeting of UKRAINIAN TELCOS. The Follina vulnerability with the identity number (CVE-2022-30190) was having the additional identification of it was made as the brains of Cyclops Blink.
0 notes
thehackernewz · 3 years ago
Text
Hackers Have Knowledge of Problems Regarding the Block Chain Thus Taking Advantage of Same in Making Data Breach
0 notes
thehackernewz · 3 years ago
Text
The Government of the United States Has Found Ten Iranian Sanctioned Links to the Attack of Ransom ware
An insight about research made by cyber security researchers the government of the United States has been able to find the ten Iranian sanctioned links having the linkage thus being with the attack of ransom ware.
0 notes
thehackernewz · 3 years ago
Text
Turning Point In The Case Of Data Breach Attack on Uber: Teen In Claws Of Laws Arrested By Uk Police For Breach On Rockstar Games
0 notes
thehackernewz · 3 years ago
Text
Black Cat Ransom ware’s Data Exfiltration Tool Gets An Upgrade
The Black Cat ransomware (aka ALPHV) is not making any kind of signs of slow down thus shown by it, and the latest example of its evolution is a new version of the ex filtration tool of gang’s data which is taken in use for the attacks with double-extortion.
0 notes
thehackernewz · 3 years ago
Text
Active Exploitation of the Stealing Flaw of Passwords Made By Hackers in Zimbra
Digital cyber security which is quiet essential for a firm or an organization have their presence online in terms of online business and e-commerce sales. Thus seeking and understanding the Grim depth of the issues faced by the firms in terms of the hacking made by the hackers in the Zimbra.
0 notes
thehackernewz · 3 years ago
Text
Massive Growth in the Percept Of Phishing Attack Since 2021 Approximately Counting To 625%
In the recent world we are facing the increasing number of cyber attack cases thus getting a hype day by day and so the methodologies taken in use are also becoming modern and numerous to give the deceit to the victim with a great ease.
0 notes
thehackernewz · 3 years ago
Text
Exposure Of Loan Data Of 2.5 Billion People In A Data Breach
We are going to study and discuss about the most crucial attack which has made to affect the 2.5 million people in a breach that could make the more trouble thus being caused to be spelled down the line.
0 notes