thehackernews.comThe Hacker News | #1 Trusted Cybersecurity News Site

thehackernews.com Profile

thehackernews.com is a domain that was created on 2010-10-27,making it 14 years ago. It has several subdomains, such as deals.thehackernews.com , among others.

Description:The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and...

Keywords:cyber security news, cyber news, cyber security news today, cyber security updates, cyber updates,...

Discover thehackernews.com website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site

thehackernews.com Information

HomePage size: 156.126 KB
Page Load Time: 0.659801 Seconds
Website IP Address: 172.67.72.95

thehackernews.com Similar Website

Cybersecurity News and Analysis | Cybersecurity Dive
link.cybersecuritydive.com
EDR - Endpoint Detection Response Security by Hacker Combat
edr.hackercombat.com
Cybersecurity Exchange | Cybersecurity Courses, Training & Certification | EC-Council
blog.eccouncil.org
Sales Hacker The Worlds Largest Community for B2B Sales
market.saleshacker.com
Null Byte — The aspiring white-hat hacker/security awareness playground « Null Byte :: WonderHowTo
null-byte.wonderhowto.com
email hacker Download - Free email hacking tool capable of hacking
email-hacker1.software.informer.com
ASP.NET Hacker
asp.net-hacker.rocks
Hacker News
news.ycombinator.com
The Hacker News Deals
deals.thehackernews.com
YGN Ethical Hacker Group Blog
bl0g.yehg.net
Cybersecurity Lawyer Forum — Published by JMBM’s Cybersecurity and Privacy Group — Jeffer Mangels Bu
cybersecurity.jmbm.com
HaCkEd By RxR HaCkEr Green Acres Turf
greenacres.sodwebdev.com
Hacker News Search powered by Algolia
hn.algolia.com
Zeta-web Nigeria Limited – iWeek reseller, cybersecurity, EC Council, ethical Hacker, cybercrime, se
znl.zeta-web.com

thehackernews.com PopUrls

The Hacker News | #1 Trusted Cybersecurity News Site
https://thehackernews.com/
Accessibility
https://deals.thehackernews.com/accessibility
Terms
https://deals.thehackernews.com/terms
Defacement | News & Insights
https://thehackernews.com/search/label/Defacement
Instagram | News & Insights
https://thehackernews.com/search/label/Instagram
TikTok | News & Insights
https://thehackernews.com/search/label/TikTok
Microsoft | News & Insights
https://thehackernews.com/search/label/Microsoft
Pegasus | News & Insights
https://thehackernews.com/search/label/Pegasus
OSINT | News & Insights
https://thehackernews.com/search/label/OSINT
Adobe | News & Insights
https://thehackernews.com/search/label/Adobe

thehackernews.com DNS

A thehackernews.com. 300 IN A 104.26.11.117
AAAA thehackernews.com. 300 IN AAAA 2606:4700:20::681a:a75
MX thehackernews.com. 300 IN MX 1 aspmx.l.google.com.
NS thehackernews.com. 21600 IN NS kurt.ns.cloudflare.com.
TXT thehackernews.com. 300 IN TXT adn_verification=thehackernews
SOA thehackernews.com. 1800 IN SOA kurt.ns.cloudflare.com. dns.cloudflare.com. 2340745120 10000 2400 604800 1800

thehackernews.com Httpheader

Date: Tue, 14 May 2024 10:12:37 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
CF-Ray: 883a1c641dde2094-IAD
CF-Cache-Status: HIT
Accept-Ranges: bytes
Age: 183
Cache-Control: public, s-maxage=3600, max-age=0, stale-if-error=86400
Expires: Tue, 14 May 2024 10:09:34 GMT
Last-Modified: Tue, 14 May 2024 09:50:13 GMT
Strict-Transport-Security: max-age=15552000; includeSubDomains; preload
Vary: Accept-Encoding
Cf-Placement: local-IAD
Content-Security-Policy: upgrade-insecure-requests
Referrer-Policy: no-referrer-when-downgrade
X-Content-Type-Options: nosniff
X-Forwarded-For: 240e:390:9a7:3652::3de
X-Frame-Options: SAMEORIGIN
X-Powered-By: Google Frontend
X-XSS-Protection: 1; mode=block
Server: cloudflare
alt-svc: h3=":443"; ma=86400

thehackernews.com Meta Info

charset="utf-8"/
content="IE=9; IE=8; IE=7; IE=EDGE; chrome=1" http-equiv="X-UA-Compatible"/
content="index, follow, noarchive, max-image-preview:large, max-snippet:-1, max-video-preview:-1" name="robots"/
content="width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=6.0" name="viewport"/
content="yes" name="mobile-web-app-capable"/
content="yes" name="apple-mobile-web-app-capable"/
content="#3732b3" name="theme-color"/
content="#3732b3" name="msapplication-navbutton-color"/
content="#3732b3" name="apple-mobile-web-app-status-bar-style"/
content="280117418781535" property="fb:app_id"/
content="The Hacker News" property="og:site_name"/
content="en_US" property="og:locale"/
content="The Hacker News | #1 Trusted Cybersecurity News Site" name="twitter:title" property="og:title"/
content="The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and analysis." name="description"/
content="The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and analysis." property="og:description"/
content="The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and analysis." name="twitter:description"/
content="website" property="og:type"/
content="https://thehackernews.com/images/-AaptImXE5Y4/WzjvqBS8HtI/AAAAAAAAxSs/BcCIwpWJszILkuEbDfKZhxQJwOAD7qV6ACLcBGAs/s728-rw-e365/the-hacker-news.jpg" name="twitter:image" property="og:image"/
content="https://thehackernews.com/" property="og:url"/
content="@TheHackersNews" name="twitter:creator"/
content="@TheHackersNews" name="twitter:site"/
content="thehackernews.com" name="twitter:domain"/
content="summary_large_image" name="twitter:card"/
content="1251386282" property="fb:admins"/
content="172819872731894" property="fb:pages"/
content="cyber security news, cyber news, cyber security news today, cyber security updates, cyber updates, hacker news, hacking news, software vulnerability, cyber attacks, data breach, ransomware malware, how to hack, network security, information security, the hacker news, computer security" name="keywords"/

thehackernews.com Html To Plain Text

#1 Trusted Cybersecurity News Platform Followed by 4.50+ million       Subscribe – Get Latest News  Home  Newsletter  Webinars Home Data Breaches Cyber Attacks Vulnerabilities Webinars Store Contact    Resources Webinars THN Store Free eBooks About Site About THN Jobs Advertise with us Contact/Tip Us  Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media       RSS Feeds  Email Alerts  Telegram Channel Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices  May 14, 2024 Location Tracking / Privacy Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on them without their knowledge or consent. "This will help mitigate the misuse of devices designed to help keep track of belongings," the companies said in a joint statement, adding it aims to address "potential risks to user privacy and safety." The proposal for a cross-platform solution was originally unveiled exactly a year ago by the two tech giants. The capability – dubbed " Detecting Unwanted Location Trackers " (DULT) – is available in Android devices running versions 6.0 and later, and iOS devices with iOS 17.5, which was officially shipped yesterday. As part of the industry specification, Android users will receive a "Tracker traveling with you" alert if an unidentified Bluetooth tracking device is detected as moving along with them over MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices  May 13, 2024 The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. "The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them," the non-profit said in a post announcing the move. A draft version of the model, which has been conceived in collaboration with Niyo ’Little Thunder’ Pearson, Red Balloon Security, and Narf Industries, was previously released on December 13, 2023. EMB3D, like the ATT&CK framework , is expected to be a "living framework," with new and mitigations added and updated over time as new actors, vulnerabilities, and attack vectors emerge, but with a specific focus on embedded devices. The ultimate goal is to provide device vendors with a unified picture of different vulnerabilities in t The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield  May 13, 2024 Browser Security / Data Protection With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a means for stealing sensitive data and accessing organizational systems. Security leaders who are planning their security architecture require data and insights into the browser threat landscape. Recently, LayerX released the " Annual Browser Security Report 2024 ", providing an in-depth analysis of the evolving threat landscape for browser security. This comprehensive report highlights the critical vulnerabilities and attack vectors that pose the greatest risks to enterprise security. It allows decision-makers and stakeholders to benchmark the security challenges of their environment so they can make actionable decisions. Below, we detail key findings from the report and a summarized list of security recommendations. We urge you to read the entire report , Guide: Secure Your Privileged Access with Our Expert-Approved Template Delinea IT Security / Access Control Security Transform your Privileged Access Management with our Policy Template—over 40 expertly crafted statements to elevate compliance and streamline your security. SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike  May 13, 2024 Threat Detection / SoC / SIEM In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False Positives Analysts are overwhelmed with alerts. The knock-on effect of this is that fatigued analysts are at risk of missing key details in incidents, and often conduct time-consuming triaging tasks manually only to end up copying and pasting a generic closing comment into a false positive alert. It is likely that there will always be false positives. And many would argue that a false positive is better than a false negative. But for proactive actions to be made, we must move closer to the heart of an incident. That requires diving into how analysts conduct the triage and investigation process. SHQ Response Platfo Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries  May 13, 2024 Vulnerability / IoT Security Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. "These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT devices foundational to industrial, healthcare, automotive, financial and telecommunications sectors," Kaspersky said . Cinterion modems were originally developed by Gemalto before the business was acquired by Telit from Thales as part of a deal announced in July 2022. The findings were presented at the OffensiveCon held in Berlin on May 11. The list of eight flaws is as follows - CVE-2023-47610 (CVSS score: 8.1) - A buffer overflow vulnerability that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted S Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia  May 13, 2024 Ransomware / Endpoint Security The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), the agencies said the threat actors encrypted and stole data from at least 12 out of 16 critical infrastructure sectors. "Black Basta affiliates use common initial access techniques — such as phishing and exploiting known vulnerabilities — and then employ a double-extortion model, both encrypting systems and exfiltrating data," the bulletin read . Unlike other ransomware groups, the ransom notes dropped at the end of the attack do not contain an initial ransom demand or payment instructions. Rather, the note Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo  May 13, 2024 Software Security / Malware Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project’s logo. The package employing this steganographic trickery is requests-darwin-lite , which has been downloaded 417 times prior to it being taken down from the Python Package Index (PyPI)...

thehackernews.com Whois

Domain Name: THEHACKERNEWS.COM Registry Domain ID: 1622465847_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.squarespace.domains Registrar URL: http://squarespace.domains Updated Date: 2024-02-02T08:31:03Z Creation Date: 2010-10-27T11:06:33Z Registry Expiry Date: 2026-10-27T11:06:33Z Registrar: Squarespace Domains LLC Registrar IANA ID: 3827 Registrar Abuse Contact Email: abuse-complaints@squarespace.com Registrar Abuse Contact Phone: 1-646-693-5324 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Name Server: KURT.NS.CLOUDFLARE.COM Name Server: MARIA.NS.CLOUDFLARE.COM DNSSEC: unsigned >>> Last update of whois database: 2024-05-17T19:48:15Z <<<