/ Security News /

The SolarWinds Sunburst attack has been in the headlines since it was first discovered in December 2020. As the so-called layers of the onion are peeled back, additional information regarding how the vulnerability was exploited, who was behind the attack, who is to blame for the attack, and the long-term ramifications of this type of …

/ Security News /

The attack surface is virtually expanding before our eyes. Protecting assets across multiple locations, with multiple solutions from different vendors, has become a daily concern for CISOs globally. In a new e-book recently published (download here), CISOs with small security teams talk about the drivers for replacing their EDR/NGAV solutions with an Autonomous XDR solution …

/ Security News /

Apple is facing the heat for a new feature in macOS Big Sur that allows many of its own apps to bypass firewalls and VPNs, thereby potentially allowing malware to exploit the same shortcoming to access sensitive data stored on users’ systems and transmit them to remote servers. The issue was first spotted last month …

/ Security News /

Unprecedented times call for unprecedented measures. No, we’re not talking about ‘coronavirus,’ the current global pandemic because of which Apple—for the very first time in history—organized its Worldwide Developer Conference (WWDC) virtually. Here we’re talking about a world in which we are all connected and constantly sharing data, also known as the new oil, with …

/ Security Assessments News /

When you visit a new website, your computer probably submits a request to the domain name system (DNS) to translate the domain name (like arstechnica.com) to an IP address. Currently, most DNS queries are unencrypted, which raises privacy and security concerns. Google and Mozilla are trying to address these concerns by adding support in their browsers …

/ Security News /

Remember the “Big bitcoin heist” we reported last month when a group of thieves stole around 600 powerful bitcoin mining devices from Icelandic data centers? Icelandic Police had arrested 11 suspects as part of the investigation, one of which has escaped from prison and fled to Sweden on a passenger plane reportedly also carrying the …

/ Security News /

The Hacker News (THN), the widely-read cybersecurity news source for hackers and technologists, is celebrating its 7th Anniversary today. This is a huge milestone for THN and our team, but this day really belongs to you—our readers. Without you, we would not be here, and we appreciate you for reading, commenting, and sharing our content …

/ Security News /

The group of unknown hackers who hijacked CCleaner’s download server to distribute a malicious version of the popular system optimization software targeted at least 20 major international technology companies with a second-stage payload. Earlier this week, when the CCleaner hack was reported, researchers assured users that there’s no second stage malware used in the massive …

/ Security News /

Ransomware: It’s a fast-growing form of malware that has the potential to disrupt business in a huge way. Some, like the recent WannaCry outbreak, even have the potential to spread from computer to computer. Ransomware’s continued spread may be due to how simple it is to use. After all, why do all the work of …

/ Security News /

Two years ago, Gartner analyst Merv Adrian lambasted the “nearly non-existent response” to Hadoop’s “security issue,” dubbing it “shocking.” “Can it be that people believe Hadoop is secure?” he asked, “Because it certainly is not. At every layer of the stack, vulnerabilities exist.” Hadoop vendors like Cloudera and Hortonworks have made their millions selling, in …