[{"title":"Top Free Productivity Apps for 2023","description":"https://dev.to/stephanreynolds/top-free-productivity-apps-for-2023-jlb","link":"https://www.designernews.co/stories/129198-top-free-productivity-apps-for-2023","comments":"https://www.designernews.co/stories/129198-top-free-productivity-apps-for-2023","updated_at":"2023-02-09T08:36:33+00:00","link_to_comments":"https://www.designernews.co/stories/129198-top-free-productivity-apps-for-2023","link_host":"dev.to","from":"designernews"},{"title":"Why is remote work seen as a gift?","description":"<a href="https://news.ycombinator.com/item?id=34721093">Comments</a>","link":"https://cdoyle.me/2023/02/08/why-is-remote-work-seen-as-a-gift/","comments":"https://news.ycombinator.com/item?id=34721093","updated_at":"2023-02-09T08:14:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34721093","link_host":"cdoyle.me","from":"hackernews"},{"title":"Ask HN: Please Review My Metalanguage","description":"<a href="https://news.ycombinator.com/item?id=34720488">Comments</a>","link":"https://github.com/kstenerud/kbnf/blob/master/kbnf_v1.md","comments":"https://news.ycombinator.com/item?id=34720488","updated_at":"2023-02-09T06:40:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34720488","link_host":"github.com","from":"hackernews"},{"title":"Ask HN: Is “prompt injection” going to be a new common vulnerability?","description":"<a href="https://news.ycombinator.com/item?id=34719586">Comments</a>","link":"https://news.ycombinator.com/item?id=34719586","comments":"https://news.ycombinator.com/item?id=34719586","updated_at":"2023-02-09T03:59:32+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34719586","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Podman vs. Docker: Comparing the two containerization tools","description":"<a href="https://news.ycombinator.com/item?id=34719137">Comments</a>","link":"https://www.linode.com/docs/guides/podman-vs-docker/","comments":"https://news.ycombinator.com/item?id=34719137","updated_at":"2023-02-09T02:46:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34719137","link_host":"www.linode.com","from":"hackernews"},{"title":"Ask HN: Burnt out from big tech. What's next?","description":"<a href="https://news.ycombinator.com/item?id=34719088">Comments</a>","link":"https://news.ycombinator.com/item?id=34719088","comments":"https://news.ycombinator.com/item?id=34719088","updated_at":"2023-02-09T02:39:18+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34719088","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Covid drug drives viral mutations – and now some want to halt its use","description":"<a href="https://news.ycombinator.com/item?id=34717514">Comments</a>","link":"https://www.nature.com/articles/d41586-023-00347-z","comments":"https://news.ycombinator.com/item?id=34717514","updated_at":"2023-02-08T23:51:19+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34717514","link_host":"www.nature.com","from":"hackernews"},{"title":"Photoprism – open-source Google Photos Alternative","description":"<a href="https://news.ycombinator.com/item?id=34716924">Comments</a>","link":"https://www.photoprism.app/","comments":"https://news.ycombinator.com/item?id=34716924","updated_at":"2023-02-08T23:06:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34716924","link_host":"www.photoprism.app","from":"hackernews"},{"title":"Apache Kafka Beyond the Basics: Windowing","description":"<a href="https://news.ycombinator.com/item?id=34716797">Comments</a>","link":"https://www.confluent.io/blog/windowing-in-kafka-streams/","comments":"https://news.ycombinator.com/item?id=34716797","updated_at":"2023-02-08T22:56:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34716797","link_host":"www.confluent.io","from":"hackernews"},{"title":"Vestas unveils solution to end landfill disposal for wind turbine blades","description":"<a href="https://news.ycombinator.com/item?id=34716743">Comments</a>","link":"https://www.vestas.com/en/media/company-news/2023/vestas-unveils-circularity-solution-to-end-landfill-for-c3710818","comments":"https://news.ycombinator.com/item?id=34716743","updated_at":"2023-02-08T22:52:20+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34716743","link_host":"www.vestas.com","from":"hackernews"},{"title":"25 Ideas On How To Use Personas In Product Development","description":"https://makeiterate.com/25-ideas-on-how-to-use-personas-in-product-development/","link":"https://www.designernews.co/stories/129193-25-ideas-on-how-to-use-personas-in-product-development","comments":"https://www.designernews.co/stories/129193-25-ideas-on-how-to-use-personas-in-product-development","updated_at":"2023-02-08T22:17:04+00:00","link_to_comments":"https://www.designernews.co/stories/129193-25-ideas-on-how-to-use-personas-in-product-development","link_host":"makeiterate.com","from":"designernews"},{"title":"Top byte ignore for fun and memory savings","description":"<a href="https://news.ycombinator.com/item?id=34715517">Comments</a>","link":"https://www.linaro.org/blog/top-byte-ignore-for-fun-and-memory-savings/","comments":"https://news.ycombinator.com/item?id=34715517","updated_at":"2023-02-08T21:31:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34715517","link_host":"www.linaro.org","from":"hackernews"},{"title":"Microsoft Teams Free data won’t transfer over to Microsoft Teams (free)","description":"$4-per-user-per-month Essentials tier is the only way to keep your stuff.","link":"https://arstechnica.com/?p=1916190","comments":"https://arstechnica.com/?p=1916190","updated_at":"2023-02-08T21:26:21+00:00","link_to_comments":"https://arstechnica.com/?p=1916190","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Show HN: StackOverflow.gg – AI-generated answers to every coding question","description":"<a href="https://news.ycombinator.com/item?id=34715033">Comments</a>","link":"https://stackoverflow.gg/","comments":"https://news.ycombinator.com/item?id=34715033","updated_at":"2023-02-08T20:58:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34715033","link_host":"stackoverflow.gg","from":"hackernews"},{"title":"In Paris demo, Google scrambles to counter ChatGPT but ends up embarrassing itself","description":"So far, the expected Microsoft-Google AI war has turned into an AI fizzle.","link":"https://arstechnica.com/?p=1915978","comments":"https://arstechnica.com/?p=1915978","updated_at":"2023-02-08T19:33:34+00:00","link_to_comments":"https://arstechnica.com/?p=1915978","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Probiotic blocks staph bacteria from colonizing people","description":"<a href="https://news.ycombinator.com/item?id=34713431">Comments</a>","link":"https://www.nih.gov/news-events/nih-research-matters/probiotic-blocks-staph-bacteria-colonizing-people","comments":"https://news.ycombinator.com/item?id=34713431","updated_at":"2023-02-08T19:25:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34713431","link_host":"www.nih.gov","from":"hackernews"},{"title":"Show HN: Filmbox, physically accurate film emulation, now on Linux and Windows","description":"<a href="https://news.ycombinator.com/item?id=34713202">Comments</a>","link":"https://videovillage.co/filmbox/","comments":"https://news.ycombinator.com/item?id=34713202","updated_at":"2023-02-08T19:13:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34713202","link_host":"videovillage.co","from":"hackernews"},{"title":"Hackers are selling a service that bypasses ChatGPT restrictions on malware","description":"ChatGPT restrictions on the creation of illicit content are easy to circumvent.","link":"https://arstechnica.com/?p=1916125","comments":"https://arstechnica.com/?p=1916125","updated_at":"2023-02-08T18:54:03+00:00","link_to_comments":"https://arstechnica.com/?p=1916125","link_host":"arstechnica.com","from":"arssecurity"},{"title":"NIST selects ‘lightweight cryptography’ algorithms to protect small devices","description":"<a href="https://news.ycombinator.com/item?id=34712729">Comments</a>","link":"https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography-algorithms-protect-small-devices","comments":"https://news.ycombinator.com/item?id=34712729","updated_at":"2023-02-08T18:44:56+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34712729","link_host":"www.nist.gov","from":"hackernews"},{"title":"Grim Reaper starts coming for fax machines, pagers, landlines","description":"China will stop giving network-access permits to some legacy communication tech.","link":"https://arstechnica.com/?p=1916054","comments":"https://arstechnica.com/?p=1916054","updated_at":"2023-02-08T18:38:38+00:00","link_to_comments":"https://arstechnica.com/?p=1916054","link_host":"arstechnica.com","from":"arssecurity"},{"title":"OpenSSH Pre-Auth Double Free – Writeup and Proof-of-Concept","description":"<a href="https://news.ycombinator.com/item?id=34711565">Comments</a>","link":"https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/","comments":"https://news.ycombinator.com/item?id=34711565","updated_at":"2023-02-08T17:34:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34711565","link_host":"jfrog.com","from":"hackernews"},{"title":"NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices","description":"The U.S. National Institute of Standards and Technology (NIST) has announced that a family of authenticated encryption and hashing algorithms known as Ascon will be standardized for lightweight cryptography applications.\n"The chosen algorithms are designed to protect information created and transmitted by the Internet of Things (IoT), including its myriad tiny sensors and actuators," NIST said.","link":"https://thehackernews.com/2023/02/nist-standardizes-ascon-cryptographic.html","comments":"https://thehackernews.com/2023/02/nist-standardizes-ascon-cryptographic.html","updated_at":"2023-02-08T17:18:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/nist-standardizes-ascon-cryptographic.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ask HN: How do you deal with information and internet addiction?","description":"<a href="https://news.ycombinator.com/item?id=34710830">Comments</a>","link":"https://news.ycombinator.com/item?id=34710830","comments":"https://news.ycombinator.com/item?id=34710830","updated_at":"2023-02-08T16:52:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34710830","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Fungi and bacteria are binging on burned soil","description":"<a href="https://news.ycombinator.com/item?id=34710725">Comments</a>","link":"https://news.ucr.edu/articles/2023/02/07/fungi-and-bacteria-are-binging-burned-soil","comments":"https://news.ycombinator.com/item?id=34710725","updated_at":"2023-02-08T16:46:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34710725","link_host":"news.ucr.edu","from":"hackernews"},{"title":"Hardcoded Folder Icons in macOS","description":"<a href="https://news.ycombinator.com/item?id=34709690">Comments</a>","link":"https://weblog.antranigv.am/posts/2023/02/hardcoded-folder-icons-in-macos/","comments":"https://news.ycombinator.com/item?id=34709690","updated_at":"2023-02-08T15:48:56+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34709690","link_host":"weblog.antranigv.am","from":"hackernews"},{"title":"Zrok: Open-source peer to peer","description":"<a href="https://news.ycombinator.com/item?id=34709487">Comments</a>","link":"https://zrok.io/","comments":"https://news.ycombinator.com/item?id=34709487","updated_at":"2023-02-08T15:36:41+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34709487","link_host":"zrok.io","from":"hackernews"},{"title":"Unpatched Security Flaws Disclosed in Multiple Document Management Systems","description":"Multiple unpatched security flaws have been disclosed in open source and freemium Document Management System (DMS) offerings from four vendors LogicalDOC, Mayan, ONLYOFFICE, and OpenKM.\nCybersecurity firm Rapid7 said the eight vulnerabilities offer a mechanism through which "an attacker can convince a human operator to save a malicious document on the platform and, once the document is indexed","link":"https://thehackernews.com/2023/02/unpatched-security-flaws-disclosed-in.html","comments":"https://thehackernews.com/2023/02/unpatched-security-flaws-disclosed-in.html","updated_at":"2023-02-08T15:15:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/unpatched-security-flaws-disclosed-in.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Sydney Man Sentenced for Blackmailing Optus Customers After Data Breach","description":"A Sydney man has been sentenced to an 18-month Community Correction Order (CCO) and 100 hours of community service for attempting to take advantage of the Optus data breach last year to blackmail its customers.\nThe unnamed individual, 19 when arrested in October 2022 and now 20, used the leaked records stolen from the security lapse to orchestrate an SMS-based extortion scheme.\nThe suspect","link":"https://thehackernews.com/2023/02/sydney-man-sentenced-for-blackmailing.html","comments":"https://thehackernews.com/2023/02/sydney-man-sentenced-for-blackmailing.html","updated_at":"2023-02-08T15:00:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/sydney-man-sentenced-for-blackmailing.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"ChatGPT is a data privacy nightmare, and we ought to be concerned","description":"ChatGPT's extensive language model is fueled by our personal data.","link":"https://arstechnica.com/?p=1915949","comments":"https://arstechnica.com/?p=1915949","updated_at":"2023-02-08T14:12:27+00:00","link_to_comments":"https://arstechnica.com/?p=1915949","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Mysterious leak of Booking.com reservation data is being used to scam customers","description":"Somehow, scammers keep accessing customer reservation details, other private data.","link":"https://arstechnica.com/?p=1915880","comments":"https://arstechnica.com/?p=1915880","updated_at":"2023-02-08T13:20:08+00:00","link_to_comments":"https://arstechnica.com/?p=1915880","link_host":"arstechnica.com","from":"arssecurity"},{"title":"CSS Social Media Icons","description":"https://dev.to/w7freedownload/css-social-media-icons-13oh","link":"https://www.designernews.co/stories/129187-css-social-media-icons","comments":"https://www.designernews.co/stories/129187-css-social-media-icons","updated_at":"2023-02-08T12:29:46+00:00","link_to_comments":"https://www.designernews.co/stories/129187-css-social-media-icons","link_host":"dev.to","from":"designernews"},{"title":"New neural network architecture inspired by neural system of a worm","description":"<a href="https://news.ycombinator.com/item?id=34707055">Comments</a>","link":"https://www.quantamagazine.org/researchers-discover-a-more-flexible-approach-to-machine-learning-20230207/","comments":"https://news.ycombinator.com/item?id=34707055","updated_at":"2023-02-08T12:16:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34707055","link_host":"www.quantamagazine.org","from":"hackernews"},{"title":"Shells Are Two Things","description":"<a href="https://news.ycombinator.com/item?id=34706832">Comments</a>","link":"https://borretti.me/article/shells-are-two-things","comments":"https://news.ycombinator.com/item?id=34706832","updated_at":"2023-02-08T11:42:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34706832","link_host":"borretti.me","from":"hackernews"},{"title":"Hack Is Wack! (2010)","description":"<a href="https://news.ycombinator.com/item?id=34706605">Comments</a>","link":"https://web.archive.org/web/20101222175616/http://hackiswack.com/","comments":"https://news.ycombinator.com/item?id=34706605","updated_at":"2023-02-08T11:09:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34706605","link_host":"web.archive.org","from":"hackernews"},{"title":"Polynomial interpolation","description":"<a href="https://news.ycombinator.com/item?id=34706577">Comments</a>","link":"https://cohost.org/tomforsyth/post/982199-polynomial-interpola","comments":"https://news.ycombinator.com/item?id=34706577","updated_at":"2023-02-08T11:05:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34706577","link_host":"cohost.org","from":"hackernews"},{"title":"Russian Hackers Using Graphiron Malware to Steal Data from Ukraine","description":"A Russia-linked threat actor has been observed deploying a new information-stealing malware in cyber attacks targeting Ukraine.\nDubbed Graphiron by Broadcom-owned Symantec, the malware is the handiwork of an espionage group known as Nodaria, which is tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as UAC-0056.\n"The malware is written in Go and is designed to harvest a wide","link":"https://thehackernews.com/2023/02/russian-hackers-using-graphiron-malware.html","comments":"https://thehackernews.com/2023/02/russian-hackers-using-graphiron-malware.html","updated_at":"2023-02-08T11:04:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/russian-hackers-using-graphiron-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How to Think Like a Hacker and Stay Ahead of Threats","description":"To succeed as a cybersecurity analyst, you need to understand the traits, values, and thought processes of hackers, along with the tools they use to launch their attacks. \nDuring a webinar called The Hacker Mindset, a Red Team Researcher shared how you can use some of these tools for your own detection and prevention of breaches. He also demonstrated how an attack takes place using the Follina","link":"https://thehackernews.com/2023/02/how-to-think-like-hacker-and-stay-ahead.html","comments":"https://thehackernews.com/2023/02/how-to-think-like-hacker-and-stay-ahead.html","updated_at":"2023-02-08T11:01:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/how-to-think-like-hacker-and-stay-ahead.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Russian Hacker Pleads Guilty to Money Laundering Linked to Ryuk Ransomware","description":"A Russian national on February 7, 2023, pleaded guilty in the U.S. to money laundering charges and for attempting to conceal the source of funds obtained in connection with Ryuk ransomware attacks.\nDenis Mihaqlovic Dubnikov, 30, was arrested in Amsterdam in November 2021 before he was extradited from the Netherlands in August 2022. He is awaiting sentencing on April 11, 2023.\n"Between at least","link":"https://thehackernews.com/2023/02/russian-hacker-pleads-guilty-to-money.html","comments":"https://thehackernews.com/2023/02/russian-hacker-pleads-guilty-to-money.html","updated_at":"2023-02-08T09:39:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/russian-hacker-pleads-guilty-to-money.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Mary, Queen of Scots prison letters finally decoded","description":"<a href="https://news.ycombinator.com/item?id=34705662">Comments</a>","link":"https://www.theguardian.com/uk-news/2023/feb/08/mary-queen-of-scots-prison-letters-finally-decoded","comments":"https://news.ycombinator.com/item?id=34705662","updated_at":"2023-02-08T08:40:19+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34705662","link_host":"www.theguardian.com","from":"hackernews"},{"title":"Trustfall: How to Query (Almost) Everything","description":"<a href="https://news.ycombinator.com/item?id=34705246">Comments</a>","link":"https://github.com/obi1kenobi/trustfall","comments":"https://news.ycombinator.com/item?id=34705246","updated_at":"2023-02-08T07:34:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34705246","link_host":"github.com","from":"hackernews"},{"title":"How to Add Google Analytics to Webflow","description":"https://www.linkedin.com/pulse/how-add-google-analytics-webflow-nahid-ahmed","link":"https://www.designernews.co/stories/129182-how-to-add-google-analytics-to-webflow","comments":"https://www.designernews.co/stories/129182-how-to-add-google-analytics-to-webflow","updated_at":"2023-02-08T07:18:51+00:00","link_to_comments":"https://www.designernews.co/stories/129182-how-to-add-google-analytics-to-webflow","link_host":"www.linkedin.com","from":"designernews"},{"title":"CERT-UA Alerts Ukrainian State Authorities of Remcos Software-Fueled Cyber Attacks","description":"The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert warning of cyber attacks against state authorities in the country that deploy a legitimate remote access software named Remcos.\nThe mass phishing campaign has been attributed to a threat actor it tracks as UAC-0050, with the agency describing the activity as likely motivated by espionage given the toolset employed.\nThe","link":"https://thehackernews.com/2023/02/cert-ua-alerts-ukrainian-state.html","comments":"https://thehackernews.com/2023/02/cert-ua-alerts-ukrainian-state.html","updated_at":"2023-02-08T06:16:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/cert-ua-alerts-ukrainian-state.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Top-ranked Magento Development Companies","description":"https://codersnews.info/magento-development-companies/","link":"https://www.designernews.co/stories/129179-topranked-magento-development-companies","comments":"https://www.designernews.co/stories/129179-topranked-magento-development-companies","updated_at":"2023-02-08T05:34:42+00:00","link_to_comments":"https://www.designernews.co/stories/129179-topranked-magento-development-companies","link_host":"codersnews.info","from":"designernews"},{"title":"FlexiRaft: Flexible Quorums with Raft [pdf]","description":"<a href="https://news.ycombinator.com/item?id=34704488">Comments</a>","link":"https://www.cidrdb.org/cidr2023/papers/p83-yadav.pdf","comments":"https://news.ycombinator.com/item?id=34704488","updated_at":"2023-02-08T05:29:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34704488","link_host":"www.cidrdb.org","from":"hackernews"},{"title":"A Limited Interest Article on Employer Value Prop and Hiring","description":"<a href="https://news.ycombinator.com/item?id=34704353">Comments</a>","link":"https://www.residentcontrarian.com/p/a-limited-interest-article-on-employer","comments":"https://news.ycombinator.com/item?id=34704353","updated_at":"2023-02-08T05:05:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34704353","link_host":"www.residentcontrarian.com","from":"hackernews"},{"title":"How Prototyping works for Streaming App UI Design","description":"https://www.protopie.io/blog/the-new-era-of-live-streaming-ui?utm_source=designernews&utm_medium=social&utm_campaign=customer-spotlight","link":"https://www.designernews.co/stories/129178-how-prototyping-works-for-streaming-app-ui-design","comments":"https://www.designernews.co/stories/129178-how-prototyping-works-for-streaming-app-ui-design","updated_at":"2023-02-08T03:43:12+00:00","link_to_comments":"https://www.designernews.co/stories/129178-how-prototyping-works-for-streaming-app-ui-design","link_host":"www.protopie.io","from":"designernews"},{"title":"UX Personas Without User Research: The Harsh Reality","description":"https://makeiterate.com/ux-personas-without-user-research-the-harsh-reality/","link":"https://www.designernews.co/stories/129177-ux-personas-without-user-research-the-harsh-reality","comments":"https://www.designernews.co/stories/129177-ux-personas-without-user-research-the-harsh-reality","updated_at":"2023-02-08T03:15:52+00:00","link_to_comments":"https://www.designernews.co/stories/129177-ux-personas-without-user-research-the-harsh-reality","link_host":"makeiterate.com","from":"designernews"},{"title":"DIY 1,500W solar power electric bike","description":"<a href="https://news.ycombinator.com/item?id=34703182">Comments</a>","link":"https://electrek.co/2022/07/24/diy-solar-power-electric-bike-1500w/","comments":"https://news.ycombinator.com/item?id=34703182","updated_at":"2023-02-08T02:09:43+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34703182","link_host":"electrek.co","from":"hackernews"},{"title":"Revealing the Risqué Art of Pompeii’s House of the Vettii","description":"<a href="https://news.ycombinator.com/item?id=34701696">Comments</a>","link":"https://www.atlasobscura.com/articles/art-pompeii-house-of-the-vettii","comments":"https://news.ycombinator.com/item?id=34701696","updated_at":"2023-02-07T23:45:57+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34701696","link_host":"www.atlasobscura.com","from":"hackernews"},{"title":"Microsoft announces AI-powered Bing search and Edge browser","description":"ChatGPT-style AI tech brings more context to search, available today in a limited preview.","link":"https://arstechnica.com/?p=1915710","comments":"https://arstechnica.com/?p=1915710","updated_at":"2023-02-07T20:19:06+00:00","link_to_comments":"https://arstechnica.com/?p=1915710","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Hot keys, scalability, and the Zipf distribution","description":"<a href="https://news.ycombinator.com/item?id=34697703">Comments</a>","link":"https://brooker.co.za/blog/2023/02/07/hot-keys.html","comments":"https://news.ycombinator.com/item?id=34697703","updated_at":"2023-02-07T19:16:20+00:00","link_to_comments":"https://news.ycombinator.com/item?id=34697703","link_host":"brooker.co.za","from":"hackernews"},{"title":"8 Most Common Problems in Website Design","description":"https://www.uxpin.com/studio/blog/what-are-the-most-common-problems-in-website-design/","link":"https://www.designernews.co/stories/129176-8-most-common-problems-in-website-design","comments":"https://www.designernews.co/stories/129176-8-most-common-problems-in-website-design","updated_at":"2023-02-07T19:06:04+00:00","link_to_comments":"https://www.designernews.co/stories/129176-8-most-common-problems-in-website-design","link_host":"www.uxpin.com","from":"designernews"},{"title":"Website Design Ideas for Practicing Design","description":"https://www.uxpin.com/studio/blog/website-design-ideas/","link":"https://www.designernews.co/stories/129175-website-design-ideas-for-practicing-design","comments":"https://www.designernews.co/stories/129175-website-design-ideas-for-practicing-design","updated_at":"2023-02-07T19:05:38+00:00","link_to_comments":"https://www.designernews.co/stories/129175-website-design-ideas-for-practicing-design","link_host":"www.uxpin.com","from":"designernews"},{"title":"Design System Maintenance — How to Keep Design System Up to Date?","description":"https://www.uxpin.com/studio/blog/design-system-maintenance/","link":"https://www.designernews.co/stories/129174-design-system-maintenance--how-to-keep-design-system-up-to-date","comments":"https://www.designernews.co/stories/129174-design-system-maintenance--how-to-keep-design-system-up-to-date","updated_at":"2023-02-07T19:04:46+00:00","link_to_comments":"https://www.designernews.co/stories/129174-design-system-maintenance--how-to-keep-design-system-up-to-date","link_host":"www.uxpin.com","from":"designernews"},{"title":"Encrypted Messaging App Exclu Used by Criminal Groups Cracked by Joint Law Enforcement","description":"A joint law enforcement operation conducted by Germany, the Netherlands, and Poland has cracked yet another encrypted messaging application named Exclu used by organized crime groups.\nEurojust, in a press statement, said the February 3 exercise resulted in the arrests of 45 individuals across Belgium and the Netherlands, some of whom include users as well as the administrators and owners of the","link":"https://thehackernews.com/2023/02/encrypted-messaging-app-exclu-used-by.html","comments":"https://thehackernews.com/2023/02/encrypted-messaging-app-exclu-used-by.html","updated_at":"2023-02-07T17:35:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/encrypted-messaging-app-exclu-used-by.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Google and Mozilla are working on iOS browsers that break current App Store rules","description":"Currently, all iOS and iPadOS browsers need to use the same engine as Safari.","link":"https://arstechnica.com/?p=1915588","comments":"https://arstechnica.com/?p=1915588","updated_at":"2023-02-07T17:12:39+00:00","link_to_comments":"https://arstechnica.com/?p=1915588","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Best StatusCake Alternatives in 2023","description":"https://designmodo.com/statuscake-alternatives/","link":"https://www.designernews.co/stories/129170-best-statuscake-alternatives-in-2023","comments":"https://www.designernews.co/stories/129170-best-statuscake-alternatives-in-2023","updated_at":"2023-02-07T16:28:05+00:00","link_to_comments":"https://www.designernews.co/stories/129170-best-statuscake-alternatives-in-2023","link_host":"designmodo.com","from":"designernews"},{"title":"Hackers Exploit Vulnerabilities in Sunlogin to Deploy Sliver C2 Framework","description":"Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation activities.\nThe findings come from AhnLab Security Emergency response Center (ASEC), which found that security vulnerabilities in Sunlogin, a remote desktop program developed in China, are being abused to deploy a wide range of payloads.\n"Not","link":"https://thehackernews.com/2023/02/hackers-exploit-vulnerabilities-in.html","comments":"https://thehackernews.com/2023/02/hackers-exploit-vulnerabilities-in.html","updated_at":"2023-02-07T12:58:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/hackers-exploit-vulnerabilities-in.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Tackling the New Cyber Insurance Requirements: Can Your Organization Comply?","description":"With cyberattacks around the world escalating rapidly, insurance companies are ramping up the requirements to qualify for a cyber insurance policy. Ransomware attacks were up 80% last year, prompting underwriters to put in place a number of new provisions designed to prevent ransomware and stem the record number of claims. Among these are a mandate to enforce multi-factor authentication (MFA)","link":"https://thehackernews.com/2023/02/tackling-new-cyber-insurance.html","comments":"https://thehackernews.com/2023/02/tackling-new-cyber-insurance.html","updated_at":"2023-02-07T12:47:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/tackling-new-cyber-insurance.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Designing for Color Blindness in UI Design: Best Practices & Tips","description":"https://atmos.style/blog/color-blindness-in-ui-design","link":"https://www.designernews.co/stories/129164-designing-for-color-blindness-in-ui-design-best-practices--tips","comments":"https://www.designernews.co/stories/129164-designing-for-color-blindness-in-ui-design-best-practices--tips","updated_at":"2023-02-07T12:06:17+00:00","link_to_comments":"https://www.designernews.co/stories/129164-designing-for-color-blindness-in-ui-design-best-practices--tips","link_host":"atmos.style","from":"designernews"},{"title":"Baby Tech Mobile App Design","description":"https://in.pinterest.com/pin/730568370822899100/","link":"https://www.designernews.co/stories/129161-baby-tech-mobile-app-design","comments":"https://www.designernews.co/stories/129161-baby-tech-mobile-app-design","updated_at":"2023-02-07T11:08:00+00:00","link_to_comments":"https://www.designernews.co/stories/129161-baby-tech-mobile-app-design","link_host":"in.pinterest.com","from":"designernews"},{"title":"Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm","description":"The first-ever Linux variant of the Clop ransomware has been detected in the wild, but with a faulty encryption algorithm that has made it possible to reverse engineer the process.\n"The ELF executable contains a flawed encryption algorithm making it possible to decrypt locked files without paying the ransom," SentinelOne researcher Antonis Terefos said in a report shared with The Hacker News.","link":"https://thehackernews.com/2023/02/linux-variant-of-clop-ransomware.html","comments":"https://thehackernews.com/2023/02/linux-variant-of-clop-ransomware.html","updated_at":"2023-02-07T11:02:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/linux-variant-of-clop-ransomware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"What is the Conversion Rate Formula?","description":"https://dev.to/alyciakyla/what-is-the-conversion-rate-formula-1np","link":"https://www.designernews.co/stories/129159-what-is-the-conversion-rate-formula","comments":"https://www.designernews.co/stories/129159-what-is-the-conversion-rate-formula","updated_at":"2023-02-07T10:35:44+00:00","link_to_comments":"https://www.designernews.co/stories/129159-what-is-the-conversion-rate-formula","link_host":"dev.to","from":"designernews"},{"title":"VMware Finds No Evidence of 0-Day in Ongoing ESXiArgs Ransomware Spree","description":"VMware on Monday said it found no evidence that threat actors are leveraging an unknown security flaw, i.e., a zero-day, in its software as part of an ongoing ransomware attack spree worldwide.\n"Most reports state that End of General Support (EoGS) and/or significantly out-of-date products are being targeted with known vulnerabilities which were previously addressed and disclosed in VMware","link":"https://thehackernews.com/2023/02/vmware-finds-no-evidence-of-0-day-flaw.html","comments":"https://thehackernews.com/2023/02/vmware-finds-no-evidence-of-0-day-flaw.html","updated_at":"2023-02-07T10:21:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/vmware-finds-no-evidence-of-0-day-flaw.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Best Webflow Resources To Design Your Website Effortlessly","description":"https://l.besnik.net/tajul-flowgiri","link":"https://www.designernews.co/stories/129158-best-webflow-resources-to-design-your-website-effortlessly","comments":"https://www.designernews.co/stories/129158-best-webflow-resources-to-design-your-website-effortlessly","updated_at":"2023-02-07T10:06:17+00:00","link_to_comments":"https://www.designernews.co/stories/129158-best-webflow-resources-to-design-your-website-effortlessly","link_host":"l.besnik.net","from":"designernews"},{"title":"Newsletter for Designers & Makers. 100% Free. Discover the Latest Industry Trends, News & Resources.","description":"https://dailydevlinks.com/","link":"https://www.designernews.co/stories/129157-newsletter-for-designers--makers-100-free-discover-the-latest-industry-trends-news--resources","comments":"https://www.designernews.co/stories/129157-newsletter-for-designers--makers-100-free-discover-the-latest-industry-trends-news--resources","updated_at":"2023-02-07T09:41:58+00:00","link_to_comments":"https://www.designernews.co/stories/129157-newsletter-for-designers--makers-100-free-discover-the-latest-industry-trends-news--resources","link_host":"dailydevlinks.com","from":"designernews"},{"title":"I connected Stable Diffusion with my smartphone camera. And here's what I learned.","description":"https://prototypr.io/post/i-connected-stable-diffusion-with-my-smartphone-camera-and-heres-what-i-learned","link":"https://www.designernews.co/stories/129150-i-connected-stable-diffusion-with-my-smartphone-camera-and-heres-what-i-learned","comments":"https://www.designernews.co/stories/129150-i-connected-stable-diffusion-with-my-smartphone-camera-and-heres-what-i-learned","updated_at":"2023-02-07T07:34:00+00:00","link_to_comments":"https://www.designernews.co/stories/129150-i-connected-stable-diffusion-with-my-smartphone-camera-and-heres-what-i-learned","link_host":"prototypr.io","from":"designernews"},{"title":"Hackers are mass infecting servers worldwide by exploiting a patched hole","description":"Servers running unpatched versions of ESXi are sitting ducks for ESXiArgs attacks.","link":"https://arstechnica.com/?p=1915481","comments":"https://arstechnica.com/?p=1915481","updated_at":"2023-02-06T21:32:41+00:00","link_to_comments":"https://arstechnica.com/?p=1915481","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Universal Icon Set – 1,950+ High-Quality Vector Icons","description":"https://www.pixsellz.io/universal-icon-set","link":"https://www.designernews.co/stories/129133-universal-icon-set--1950-highquality-vector-icons","comments":"https://www.designernews.co/stories/129133-universal-icon-set--1950-highquality-vector-icons","updated_at":"2023-02-06T17:56:52+00:00","link_to_comments":"https://www.designernews.co/stories/129133-universal-icon-set--1950-highquality-vector-icons","link_host":"www.pixsellz.io","from":"designernews"},{"title":"Endless Seinfeld episode grinds to a halt after AI comic violates Twitch guidelines","description":"Unintended transphobic act by AI-powered Jerry Seinfeld clone leads to 14-day ban.","link":"https://arstechnica.com/?p=1915257","comments":"https://arstechnica.com/?p=1915257","updated_at":"2023-02-06T17:10:25+00:00","link_to_comments":"https://arstechnica.com/?p=1915257","link_host":"arstechnica.com","from":"arssecurity"},{"title":"How To Hire A Web Designer That Will Be A Match For Your Project?","description":"https://medium.com/@radhika.majithiya/how-to-hire-a-web-developer-that-will-be-a-match-for-your-project-7ec6a594854c","link":"https://www.designernews.co/stories/129132-how-to-hire-a-web-designer-that-will-be-a-match-for-your-project","comments":"https://www.designernews.co/stories/129132-how-to-hire-a-web-designer-that-will-be-a-match-for-your-project","updated_at":"2023-02-06T15:51:18+00:00","link_to_comments":"https://www.designernews.co/stories/129132-how-to-hire-a-web-designer-that-will-be-a-match-for-your-project","link_host":"medium.com","from":"designernews"},{"title":"Ars Archivum: Top cloud backup services worth your money","description":"We tested five consumer-friendly cloud backup services and found a clear winner.","link":"https://arstechnica.com/?p=1867838","comments":"https://arstechnica.com/?p=1867838","updated_at":"2023-02-06T14:49:54+00:00","link_to_comments":"https://arstechnica.com/?p=1867838","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Big Tech companies use cloud computing arms to pursue alliances with AI groups","description":"Deals between Big Tech and "generative AI" startups raise competition concerns.","link":"https://arstechnica.com/?p=1915235","comments":"https://arstechnica.com/?p=1915235","updated_at":"2023-02-06T14:25:42+00:00","link_to_comments":"https://arstechnica.com/?p=1915235","link_host":"arstechnica.com","from":"arssecurity"},{"title":"GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce Industry","description":"E-commerce industries in South Korea and the U.S. are at the receiving end of an ongoing GuLoader malware campaign, cybersecurity firm Trellix disclosed late last month.\nThe malspam activity is notable for transitioning away from malware-laced Microsoft Word documents to NSIS executable files for loading the malware. Other countries targeted as part of the campaign include Germany, Saudi Arabia,","link":"https://thehackernews.com/2023/02/guloader-malware-using-malicious-nsis.html","comments":"https://thehackernews.com/2023/02/guloader-malware-using-malicious-nsis.html","updated_at":"2023-02-06T12:36:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/guloader-malware-using-malicious-nsis.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft: Iranian Nation-State Group Sanctioned by U.S. Behind Charlie Hebdo Hack","description":"An Iranian nation-state group sanctioned by the U.S. government has been attributed to the hack of the French satirical magazine Charlie Hebdo in early January 2023.\nMicrosoft, which disclosed details of the incident, is tracking the activity cluster under its chemical element-themed moniker NEPTUNIUM, which is an Iran-based company known as Emennet Pasargad.\nIn January 2022, the U.S. Federal","link":"https://thehackernews.com/2023/02/microsoft-iranian-nation-state-group.html","comments":"https://thehackernews.com/2023/02/microsoft-iranian-nation-state-group.html","updated_at":"2023-02-06T12:09:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/microsoft-iranian-nation-state-group.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"SaaS in the Real World: Who's Responsible to Secure this Data?","description":"When SaaS applications started growing in popularity, it was unclear who was responsible for securing the data. Today, most security and IT teams understand the shared responsibility model, in which the SaaS vendor is responsible for securing the application, while the organization is responsible for securing their data. \nWhat’s far murkier, however, is where the data responsibility lies on the","link":"https://thehackernews.com/2023/02/saas-in-real-world-whos-responsible-to.html","comments":"https://thehackernews.com/2023/02/saas-in-real-world-whos-responsible-to.html","updated_at":"2023-02-06T10:00:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/saas-in-real-world-whos-responsible-to.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability","description":"The maintainers of OpenSSH have released OpenSSH 9.2 to address a number of security bugs, including a memory safety vulnerability in the OpenSSH server (sshd).\nTracked as CVE-2023-25136, the shortcoming has been classified as a pre-authentication double free vulnerability that was introduced in version 9.1.\n"This is not believed to be exploitable, and it occurs in the unprivileged pre-auth","link":"https://thehackernews.com/2023/02/openssh-releases-patch-for-new-pre-auth.html","comments":"https://thehackernews.com/2023/02/openssh-releases-patch-for-new-pre-auth.html","updated_at":"2023-02-06T09:55:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/openssh-releases-patch-for-new-pre-auth.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"What is it like to have an extremely high IQ?","description":"https://realiqtests.com/what-is-it-like-to-have-an-extremely-high-iq","link":"https://www.designernews.co/stories/129122-what-is-it-like-to-have-an-extremely-high-iq","comments":"https://www.designernews.co/stories/129122-what-is-it-like-to-have-an-extremely-high-iq","updated_at":"2023-02-06T09:11:34+00:00","link_to_comments":"https://www.designernews.co/stories/129122-what-is-it-like-to-have-an-extremely-high-iq","link_host":"realiqtests.com","from":"designernews"},{"title":"FormBook Malware Spreads via Malvertising Using MalVirt Loader to Evade Detection","description":"An ongoing malvertising campaign is being used to distribute virtualized .NET loaders that are designed to deploy the FormBook information-stealing malware.\n"The loaders, dubbed MalVirt, use obfuscated virtualization for anti-analysis and evasion along with the Windows Process Explorer driver for terminating processes," SentinelOne researchers Aleksandar Milenkoski and Tom Hegel said in a","link":"https://thehackernews.com/2023/02/formbook-malware-spreads-via.html","comments":"https://thehackernews.com/2023/02/formbook-malware-spreads-via.html","updated_at":"2023-02-06T08:11:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/formbook-malware-spreads-via.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Unveiling The Best Online Animation Software of 2023: Which One Is Right For You?","description":"https://en.eagle.cool/blog/post/online-animation-software","link":"https://www.designernews.co/stories/129118-unveiling-the-best-online-animation-software-of-2023-which-one-is-right-for-you","comments":"https://www.designernews.co/stories/129118-unveiling-the-best-online-animation-software-of-2023-which-one-is-right-for-you","updated_at":"2023-02-06T05:29:56+00:00","link_to_comments":"https://www.designernews.co/stories/129118-unveiling-the-best-online-animation-software-of-2023-which-one-is-right-for-you","link_host":"en.eagle.cool","from":"designernews"},{"title":"8 Product Design Principles For Better Work And Collaboration","description":"https://makeiterate.com/8-product-design-principles-for-better-work-and-collaboration/","link":"https://www.designernews.co/stories/129116-8-product-design-principles-for-better-work-and-collaboration","comments":"https://www.designernews.co/stories/129116-8-product-design-principles-for-better-work-and-collaboration","updated_at":"2023-02-06T02:04:46+00:00","link_to_comments":"https://www.designernews.co/stories/129116-8-product-design-principles-for-better-work-and-collaboration","link_host":"makeiterate.com","from":"designernews"},{"title":"Metalmorphism (metallic UI elements)","description":"https://www.metalmorphism.com","link":"https://www.designernews.co/stories/129115-metalmorphism-metallic-ui-elements","comments":"https://www.designernews.co/stories/129115-metalmorphism-metallic-ui-elements","updated_at":"2023-02-05T22:46:01+00:00","link_to_comments":"https://www.designernews.co/stories/129115-metalmorphism-metallic-ui-elements","link_host":"www.metalmorphism.com","from":"designernews"},{"title":"Why Webflow is Better Than Wordpress?","description":"https://www.linkedin.com/pulse/why-webflow-better-than-wordpress-saleh-ahmed","link":"https://www.designernews.co/stories/129111-why-webflow-is-better-than-wordpress","comments":"https://www.designernews.co/stories/129111-why-webflow-is-better-than-wordpress","updated_at":"2023-02-05T07:05:37+00:00","link_to_comments":"https://www.designernews.co/stories/129111-why-webflow-is-better-than-wordpress","link_host":"www.linkedin.com","from":"designernews"},{"title":"PixPirate: New Android Banking Trojan Targeting Brazilian Financial Institutions","description":"A new Android banking trojan has set its eyes on Brazilian financial institutions to commit fraud by leveraging the PIX payments platform.\nItalian cybersecurity company Cleafy, which discovered the malware between the end of 2022 and the beginning of 2023, is tracking it under the name PixPirate.\n"PixPirate belongs to the newest generation of Android banking trojan, as it can perform ATS (","link":"https://thehackernews.com/2023/02/pixpirate-new-android-banking-trojan.html","comments":"https://thehackernews.com/2023/02/pixpirate-new-android-banking-trojan.html","updated_at":"2023-02-04T13:39:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/pixpirate-new-android-banking-trojan.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Top Free Photo & Video Editing Apps for 2023","description":"https://dev.to/stephanreynolds/top-free-photo-video-editing-apps-for-2023-naj","link":"https://www.designernews.co/stories/129104-top-free-photo--video-editing-apps-for-2023","comments":"https://www.designernews.co/stories/129104-top-free-photo--video-editing-apps-for-2023","updated_at":"2023-02-04T10:47:39+00:00","link_to_comments":"https://www.designernews.co/stories/129104-top-free-photo--video-editing-apps-for-2023","link_host":"dev.to","from":"designernews"},{"title":"New Wave of Ransomware Attacks Exploiting VMware Bug to Target ESXi Servers","description":"VMware ESXi hypervisors are the target of a new wave of attacks designed to deploy ransomware on compromised systems.\n"These attack campaigns appear to exploit CVE-2021-21974, for which a patch has been available since February 23, 2021," the Computer Emergency Response Team (CERT) of France said in an advisory on Friday.\nVMware, in its own alert released at the time, described the issue as an ","link":"https://thehackernews.com/2023/02/new-wave-of-ransomware-attacks.html","comments":"https://thehackernews.com/2023/02/new-wave-of-ransomware-attacks.html","updated_at":"2023-02-04T05:30:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/new-wave-of-ransomware-attacks.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Warning: Hackers Actively Exploiting Zero-Day in Fortra's GoAnywhere MFT","description":"A zero-day vulnerability affecting Fortra's GoAnywhere MFT managed file transfer application is being actively exploited in the wild.\nDetails of the flaw were first publicly shared by security reporter Brian Krebs on Mastodon. No public advisory has been published by Fortra.\nThe vulnerability is a case of remote code injection that requires access to the administrative console of the application","link":"https://thehackernews.com/2023/02/warning-hackers-actively-exploiting.html","comments":"https://thehackernews.com/2023/02/warning-hackers-actively-exploiting.html","updated_at":"2023-02-04T04:41:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/warning-hackers-actively-exploiting.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft alleges attacks on French magazine came from Iranian-backed group","description":"Leaked personal data of Charlie Hebdo customers puts them at risk from extremists.","link":"https://arstechnica.com/?p=1915010","comments":"https://arstechnica.com/?p=1915010","updated_at":"2023-02-03T21:10:23+00:00","link_to_comments":"https://arstechnica.com/?p=1915010","link_host":"arstechnica.com","from":"arssecurity"},{"title":"The newest feature in the Microsoft Store is more ads","description":"App store ads on other platforms may offer benefits to devs—but few for users.","link":"https://arstechnica.com/?p=1914756","comments":"https://arstechnica.com/?p=1914756","updated_at":"2023-02-03T16:29:44+00:00","link_to_comments":"https://arstechnica.com/?p=1914756","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Is Your EV Charging Station Safe? New Security Vulnerabilities Uncovered","description":"Two new security weaknesses discovered in several electric vehicle (EV) charging systems could be exploited to remotely shut down charging stations and even expose them to data and energy theft.\nThe findings, which come from Israel-based SaiFlow, once again demonstrate the potential risks facing the EV charging infrastructure.\nThe issues have been identified in version 1.6J of the Open Charge","link":"https://thehackernews.com/2023/02/is-your-ev-charging-station-safe-new.html","comments":"https://thehackernews.com/2023/02/is-your-ev-charging-station-safe-new.html","updated_at":"2023-02-03T15:36:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/is-your-ev-charging-station-safe-new.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering Malware","description":"In a continuing sign that threat actors are adapting well to a post-macro world, it has emerged that the use of Microsoft OneNote documents to deliver malware via phishing attacks is on the rise.\nSome of the notable malware families that are being distributed using this method include AsyncRAT, RedLine Stealer, Agent Tesla, DOUBLEBACK, Quasar RAT, XWorm, Qakbot, BATLOADER, and FormBook.","link":"https://thehackernews.com/2023/02/post-macro-world-sees-rise-in-microsoft.html","comments":"https://thehackernews.com/2023/02/post-macro-world-sees-rise-in-microsoft.html","updated_at":"2023-02-03T15:03:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/post-macro-world-sees-rise-in-microsoft.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Until further notice, think twice before using Google to download software","description":"Over the past month, Google has been outgunned by malvertisers with new tricks.","link":"https://arstechnica.com/?p=1914704","comments":"https://arstechnica.com/?p=1914704","updated_at":"2023-02-03T13:29:28+00:00","link_to_comments":"https://arstechnica.com/?p=1914704","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Iranian OilRig Hackers Using New Backdoor to Exfiltrate Data from Govt. Organizations","description":"The Iranian nation-state hacking group known as OilRig has continued to target government organizations in the Middle East as part of a cyber espionage campaign that leverages a new backdoor to exfiltrate data.\n"The campaign abuses legitimate but compromised email accounts to send stolen data to external mail accounts controlled by the attackers," Trend Micro researchers Mohamed Fahmy, Sherif","link":"https://thehackernews.com/2023/02/iranian-oilrig-hackers-using-new.html","comments":"https://thehackernews.com/2023/02/iranian-oilrig-hackers-using-new.html","updated_at":"2023-02-03T12:12:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/iranian-oilrig-hackers-using-new.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"The Pivot: How MSPs Can Turn a Challenge Into a Once-in-a-Decade Opportunity","description":"Cybersecurity is quickly becoming one of the most significant growth drivers for Managed Service Providers (MSPs). That's the main insight from a recent study from Lumu: in North America, more than 80% of MSPs cite cybersecurity as a primary growth driver of their business. Service providers have a huge opportunity to expand their business and win new customers by developing their cybersecurity","link":"https://thehackernews.com/2023/02/the-pivot-how-msps-can-turn-challenge.html","comments":"https://thehackernews.com/2023/02/the-pivot-how-msps-can-turn-challenge.html","updated_at":"2023-02-03T11:37:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/the-pivot-how-msps-can-turn-challenge.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Atlassian's Jira Service Management Found Vulnerable to Critical Vulnerability","description":"Atlassian has released fixes to resolve a critical security flaw in Jira Service Management Server and Data Center that could be abused by an attacker to pass off as another user and gain unauthorized access to susceptible instances.\nThe vulnerability is tracked as CVE-2023-22501 (CVSS score: 9.4) and has been described as a case of broken authentication with low attack complexity.\n"An","link":"https://thehackernews.com/2023/02/atlassians-jira-software-found.html","comments":"https://thehackernews.com/2023/02/atlassians-jira-software-found.html","updated_at":"2023-02-03T07:55:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/atlassians-jira-software-found.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New High-Severity Vulnerabilities Discovered in Cisco IOx and F5 BIG-IP Products","description":"F5 has warned of a high-severity flaw impacting BIG-IP appliances that could lead to denial-of-service (DoS) or arbitrary code execution.\nThe issue is rooted in the iControl Simple Object Access Protocol (SOAP) interface and affects the following versions of BIG-IP -\n\n13.1.5\n14.1.4.6 - 14.1.5\n15.1.5.1 - 15.1.8\n16.1.2.2 - 16.1.3, and\n17.0.0\n\n"A format string vulnerability exists in iControl SOAP","link":"https://thehackernews.com/2023/02/new-high-severity-vulnerabilities.html","comments":"https://thehackernews.com/2023/02/new-high-severity-vulnerabilities.html","updated_at":"2023-02-03T07:26:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/new-high-severity-vulnerabilities.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"CISA Alert: Oracle E-Business Suite and SugarCRM Vulnerabilities Under Attack","description":"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on February 2 added two security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation.\nThe first of the two vulnerabilities is CVE-2022-21587 (CVSS score: 9.8), a critical issue impacting versions 12.2.3 to 12.2.11 of the Oracle Web Applications Desktop Integrator product.\n"Oracle","link":"https://thehackernews.com/2023/02/cisa-alert-oracle-e-business-suite-and.html","comments":"https://thehackernews.com/2023/02/cisa-alert-oracle-e-business-suite-and.html","updated_at":"2023-02-03T05:23:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/cisa-alert-oracle-e-business-suite-and.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Russian-Backed Gamaredon's Spyware Variants Targeting Ukrainian Authorities","description":"The State Cyber Protection Centre (SCPC) of Ukraine has called out the Russian state-sponsored threat actor known as Gamaredon for its targeted cyber attacks on public authorities and critical information infrastructure in the country.\nThe advanced persistent threat, also known as Actinium, Armageddon, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, and UAC-0010, has a track record of ","link":"https://thehackernews.com/2023/02/new-russian-backed-gamaredons-spyware.html","comments":"https://thehackernews.com/2023/02/new-russian-backed-gamaredons-spyware.html","updated_at":"2023-02-02T12:43:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/new-russian-backed-gamaredons-spyware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Cybersecurity Budgets Are Going Up. So Why Aren't Breaches Going Down?","description":"Over the past few years, cybersecurity has become a major concern for businesses around the globe. With the total cost of cybercrime in 2023 forecasted to reach $8 Trillion – with a T, not a B – it’s no wonder that cybersecurity is top of mind for leaders across all industries and regions.\nHowever, despite growing attention and budgets for cybersecurity in recent years, attacks have only become","link":"https://thehackernews.com/2023/02/cybersecurity-budgets-are-going-up-so.html","comments":"https://thehackernews.com/2023/02/cybersecurity-budgets-are-going-up-so.html","updated_at":"2023-02-02T10:04:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/cybersecurity-budgets-are-going-up-so.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"North Korean Hackers Exploit Unpatched Zimbra Devices in 'No Pineapple' Campaign","description":"A new intelligence gathering campaign linked to the prolific North Korean state-sponsored Lazarus Group leveraged known security flaws in unpatched Zimbra devices to compromise victim systems.\nThat's according to Finnish cybersecurity company WithSecure (formerly F-Secure), which codenamed the incident No Pineapple in reference to an error message that's used in one of the backdoors.\nTargets of","link":"https://thehackernews.com/2023/02/north-korean-hackers-exploit-unpatched.html","comments":"https://thehackernews.com/2023/02/north-korean-hackers-exploit-unpatched.html","updated_at":"2023-02-02T09:45:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/north-korean-hackers-exploit-unpatched.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers","description":"At least 1,200 Redis database servers worldwide have been corralled into a botnet using an "elusive and severe threat" dubbed HeadCrab since early September 2021.\n"This advanced threat actor utilizes a state-of-the-art, custom-made malware that is undetectable by agentless and traditional anti-virus solutions to compromise a large number of Redis servers," Aqua security researcher Asaf Eitani ","link":"https://thehackernews.com/2023/02/new-threat-stealthy-headcrab-malware.html","comments":"https://thehackernews.com/2023/02/new-threat-stealthy-headcrab-malware.html","updated_at":"2023-02-02T06:47:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/new-threat-stealthy-headcrab-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"ChatGPT sets record for fastest-growing user base in history, report says","description":"Intense demand for AI chatbot breaks records and inspires new $20/mo subscription plan.","link":"https://arstechnica.com/?p=1914265","comments":"https://arstechnica.com/?p=1914265","updated_at":"2023-02-01T22:57:52+00:00","link_to_comments":"https://arstechnica.com/?p=1914265","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Up to 29,000 unpatched QNAP storage devices are sitting ducks to ransomware","description":"QNAP storage devices are a frequent target of criminal hackers.","link":"https://arstechnica.com/?p=1914239","comments":"https://arstechnica.com/?p=1914239","updated_at":"2023-02-01T21:08:59+00:00","link_to_comments":"https://arstechnica.com/?p=1914239","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Netflix stirs fears by using AI-assisted background art in short anime film","description":"Netflix cites labor shortage, kicks hornets nest with AI-assisted 3-minute short.","link":"https://arstechnica.com/?p=1914185","comments":"https://arstechnica.com/?p=1914185","updated_at":"2023-02-01T21:00:01+00:00","link_to_comments":"https://arstechnica.com/?p=1914185","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility","description":"Cybersecurity researchers have disclosed details of two security flaws in the open source ImageMagick software that could potentially lead to a denial-of-service (DoS) and information disclosure.\nThe two issues, which were identified by Latin American cybersecurity firm Metabase Q in version 7.1.0-49, were addressed in ImageMagick version 7.1.0-52, released in November 2022.\n\nA","link":"https://thehackernews.com/2023/02/researchers-uncover-new-bugs-in-popular.html","comments":"https://thehackernews.com/2023/02/researchers-uncover-new-bugs-in-popular.html","updated_at":"2023-02-01T19:59:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/researchers-uncover-new-bugs-in-popular.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New data illustrates time’s effect on hard drive failure rates","description":"Backblaze examines 230,921 HDDs across 29 models from Seagate, Toshiba, and more.","link":"https://arstechnica.com/?p=1914056","comments":"https://arstechnica.com/?p=1914056","updated_at":"2023-02-01T18:48:03+00:00","link_to_comments":"https://arstechnica.com/?p=1914056","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Paper: Stable Diffusion “memorizes” some images, sparking privacy concerns","description":"But out of 300,000 high-probability images tested, researchers found a 0.03% memorization rate.","link":"https://arstechnica.com/?p=1913780","comments":"https://arstechnica.com/?p=1913780","updated_at":"2023-02-01T18:37:40+00:00","link_to_comments":"https://arstechnica.com/?p=1913780","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Experts Warn of 'Ice Breaker' Cyberattacks Targeting Gaming and Gambling Industry","description":"A new attack campaign has been targeting the gaming and gambling sectors since at least September 2022, just as the ICE London 2023 gaming industry trade fair event is scheduled to kick off next week.\nIsraeli cybersecurity company Security Joes is tracking the activity cluster under the name Ice Breaker, stating the intrusions employ clever social engineering tactics to deploy a JavaScript","link":"https://thehackernews.com/2023/02/experts-warn-of-ice-breaker.html","comments":"https://thehackernews.com/2023/02/experts-warn-of-ice-breaker.html","updated_at":"2023-02-01T13:56:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/experts-warn-of-ice-breaker.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices","description":"A new exploit has been devised to "unenroll" enterprise- or school-managed Chromebooks from administrative control.\nEnrolling ChromeOS devices makes it possible to enforce device policies as set by the organization via the Google Admin console, including the features that are available to users.\n"Each enrolled device complies with the policies you set until you wipe or deprovision it," Google ","link":"https://thehackernews.com/2023/02/new-sh1mmer-exploit-for-chromebook.html","comments":"https://thehackernews.com/2023/02/new-sh1mmer-exploit-for-chromebook.html","updated_at":"2023-02-01T10:46:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/new-sh1mmer-exploit-for-chromebook.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Auditing Kubernetes with Open Source SIEM and XDR","description":"Container technology has gained traction among businesses due to the increased efficiency it provides. In this regard, organizations widely use Kubernetes for deploying, scaling, and managing containerized applications. Organizations should audit Kubernetes to ensure compliance with regulations, find anomalies, and identify security risks. The Wazuh open source platform plays a critical role in","link":"https://thehackernews.com/2023/02/auditing-kubernetes-with-open-source.html","comments":"https://thehackernews.com/2023/02/auditing-kubernetes-with-open-source.html","updated_at":"2023-02-01T10:26:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/auditing-kubernetes-with-open-source.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards","description":"The Brazilian threat actors behind an advanced and modular point-of-sale (PoS) malware known as Prilex have reared their head once again with new updates that allow it to block contactless payment transactions.\nRussian cybersecurity firm Kaspersky said it detected three versions of Prilex (06.03.8080, 06.03.8072, and 06.03.8070) that are capable of targeting NFC-enabled credit cards, taking its","link":"https://thehackernews.com/2023/02/prilex-pos-malware-evolves-to-block.html","comments":"https://thehackernews.com/2023/02/prilex-pos-malware-evolves-to-block.html","updated_at":"2023-02-01T10:25:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/prilex-pos-malware-evolves-to-block.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Abused Microsoft's \"Verified Publisher\" OAuth Apps to Breach Corporate Email Accounts","description":"Microsoft on Tuesday said it took steps to disable fake Microsoft Partner Network (MPN) accounts that were used for creating malicious OAuth applications as part of a phishing campaign designed to breach organizations' cloud environments and steal email.\n"The applications created by these fraudulent actors were then used in a consent phishing campaign, which tricked users into granting","link":"https://thehackernews.com/2023/02/hackers-abused-microsofts-verified.html","comments":"https://thehackernews.com/2023/02/hackers-abused-microsofts-verified.html","updated_at":"2023-02-01T05:30:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/hackers-abused-microsofts-verified.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software","description":"Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after three security vulnerabilities were brought to light in the same product.\nFirmware security firm Eclypsium said the two shortcomings were held back until now to provide AMI additional time to engineer appropriate mitigations.\nThe issues, collectively","link":"https://thehackernews.com/2023/02/additional-supply-chain-vulnerabilities.html","comments":"https://thehackernews.com/2023/02/additional-supply-chain-vulnerabilities.html","updated_at":"2023-02-01T03:14:00+00:00","link_to_comments":"https://thehackernews.com/2023/02/additional-supply-chain-vulnerabilities.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"You Don't Know Where Your Secrets Are","description":"Do you know where your secrets are? If not, I can tell you: you are not alone.\nHundreds of CISOs, CSOs, and security leaders, whether from small or large companies, don't know either. No matter the organization's size, the certifications, tools, people, and processes: secrets are not visible in 99% of cases.\nIt might sound ridiculous at first: keeping secrets is an obvious first thought when","link":"https://thehackernews.com/2023/01/you-dont-know-where-your-secrets-are.html","comments":"https://thehackernews.com/2023/01/you-dont-know-where-your-secrets-are.html","updated_at":"2023-01-31T12:46:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/you-dont-know-where-your-secrets-are.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector","description":"The Russia-affiliated Sandworm used yet another wiper malware strain dubbed NikoWiper as part of an attack that took place in October 2022 targeting an energy sector company in Ukraine.\n"The NikoWiper is based on SDelete, a command line utility from Microsoft that is used for securely deleting files," cybersecurity company ESET revealed in its latest APT Activity Report shared with The Hacker","link":"https://thehackernews.com/2023/01/new-report-reveals-nikowiper-malware.html","comments":"https://thehackernews.com/2023/01/new-report-reveals-nikowiper-malware.html","updated_at":"2023-01-31T11:08:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/new-report-reveals-nikowiper-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years","description":"A shellcode-based packer dubbed TrickGate has been successfully operating without attracting notice for over six years, while enabling threat actors to deploy a wide range of malware such as TrickBot, Emotet, AZORult, Agent Tesla, FormBook, Cerber, Maze, and REvil over the years.\n"TrickGate managed to stay under the radar for years because it is transformative – it undergoes changes periodically","link":"https://thehackernews.com/2023/01/researchers-uncover-packer-that-helped.html","comments":"https://thehackernews.com/2023/01/researchers-uncover-packer-that-helped.html","updated_at":"2023-01-31T10:39:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/researchers-uncover-packer-that-helped.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates","description":"Taiwanese company QNAP has released updates to remediate a critical security flaw affecting its network-attached storage (NAS) devices that could lead to arbitrary code injection.\nTracked as CVE-2022-27596, the vulnerability is rated 9.8 out of a maximum of 10 on the CVSS scoring scale. It affects QTS 5.0.1 and QuTS hero h5.0.1.\n"If exploited, this vulnerability allows remote attackers to inject","link":"https://thehackernews.com/2023/01/qnap-fixes-critical-vulnerability-in.html","comments":"https://thehackernews.com/2023/01/qnap-fixes-critical-vulnerability-in.html","updated_at":"2023-01-31T04:06:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/qnap-fixes-critical-vulnerability-in.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"GitHub Breach: Hackers Stole Code-Signing Certificates for GitHub Desktop and Atom","description":"GitHub on Monday disclosed that unknown threat actors managed to exfiltrate encrypted code signing certificates pertaining to some versions of GitHub Desktop for Mac and Atom apps.\nAs a result, the company is taking the step of revoking the exposed certificates out of abundance of caution. The following versions of GitHub Desktop for Mac have been invalidated: 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6,","link":"https://thehackernews.com/2023/01/github-breach-hackers-stole-code.html","comments":"https://thehackernews.com/2023/01/github-breach-hackers-stole-code.html","updated_at":"2023-01-31T03:37:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/github-breach-hackers-stole-code.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Titan Stealer: A New Golang-Based Information Stealer Malware Emerges","description":"A new Golang-based information stealer malware dubbed Titan Stealer is being advertised by threat actors through their Telegram channel.\n"The stealer is capable of stealing a variety of information from infected Windows machines, including credential data from browsers and crypto wallets, FTP client details, screenshots, system information, and grabbed files," Uptycs security researchers","link":"https://thehackernews.com/2023/01/titan-stealer-new-golang-based.html","comments":"https://thehackernews.com/2023/01/titan-stealer-new-golang-based.html","updated_at":"2023-01-30T11:26:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/titan-stealer-new-golang-based.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices","description":"Researchers are warning about a spike in exploitation attempts weaponizing a now-patched critical remote code execution flaw in Realtek Jungle SDK since the start of August 2022.\nAccording to Palo Alto Networks Unit 42, the ongoing campaign is said to have recorded 134 million exploit attempts as of December 2022, with 97% of the attacks occurring in the past four months.\nClose to 50% of the","link":"https://thehackernews.com/2023/01/realtek-vulnerability-under-attack-134.html","comments":"https://thehackernews.com/2023/01/realtek-vulnerability-under-attack-134.html","updated_at":"2023-01-30T09:30:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/realtek-vulnerability-under-attack-134.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Gootkit Malware Continues to Evolve with New Components and Obfuscations","description":"The threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new components and obfuscations to their infection chains.\nGoogle-owned Mandiant is monitoring the activity cluster under the moniker UNC2565, noting that the usage of the malware is "exclusive to this group."\nGootkit, also called Gootloader, is spread through compromised websites that","link":"https://thehackernews.com/2023/01/gootkit-malware-continues-to-evolve.html","comments":"https://thehackernews.com/2023/01/gootkit-malware-continues-to-evolve.html","updated_at":"2023-01-29T05:47:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/gootkit-malware-continues-to-evolve.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Urges Customers to Secure On-Premises Exchange Servers","description":"Microsoft is urging customers to keep their Exchange servers updated as well as take steps to bolster the environment, such as enabling Windows Extended Protection and configuring certificate-based signing of PowerShell serialization payloads.\n"Attackers looking to exploit unpatched Exchange servers are not going to go away," the tech giant's Exchange Team said in a post. "There are too many","link":"https://thehackernews.com/2023/01/microsoft-urges-customers-to-secure-on.html","comments":"https://thehackernews.com/2023/01/microsoft-urges-customers-to-secure-on.html","updated_at":"2023-01-28T10:42:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/microsoft-urges-customers-to-secure-on.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"ISC Releases Security Patches for New BIND DNS Software Vulnerabilities","description":"The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could lead to a denial-of-service (DoS) condition.\n"A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions and system failures," the U.S. Cybersecurity","link":"https://thehackernews.com/2023/01/isc-releases-security-patches-for-new.html","comments":"https://thehackernews.com/2023/01/isc-releases-security-patches-for-new.html","updated_at":"2023-01-28T07:55:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/isc-releases-security-patches-for-new.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber Attack","description":"Ukraine has come under a fresh cyber onslaught from Russia that involved the deployment of a previously undocumented Golang-based data wiper dubbed SwiftSlicer.\nESET attributed the attack to Sandworm, a nation-state group linked to Military Unit 74455 of the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU).\n"Once executed it deletes shadow","link":"https://thehackernews.com/2023/01/ukraine-hit-with-new-golang-based.html","comments":"https://thehackernews.com/2023/01/ukraine-hit-with-new-golang-based.html","updated_at":"2023-01-28T05:49:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/ukraine-hit-with-new-golang-based.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge","description":"The use of software as a service (SaaS) is experiencing rapid growth and shows no signs of slowing down. Its decentralized and easy-to-use nature is beneficial for increasing employee productivity, but it also poses many security and IT challenges. Keeping track of all the SaaS applications that have been granted access to an organization's data is a difficult task. Understanding the risks that","link":"https://thehackernews.com/2023/01/eliminating-saas-shadow-it-is-now.html","comments":"https://thehackernews.com/2023/01/eliminating-saas-shadow-it-is-now.html","updated_at":"2023-01-27T22:30:00+00:00","link_to_comments":"https://thehackernews.com/2023/01/eliminating-saas-shadow-it-is-now.html","link_host":"thehackernews.com","from":"thehackernews"}]