thehackernews.com is a domain that was created on 2010-10-27,making it 14 years ago. It has several subdomains, such as deals.thehackernews.com , among others.
Description:The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and...
Keywords:cyber security news, cyber news, cyber security news today, cyber security updates, cyber updates,...
Discover thehackernews.com website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site
HomePage size: 156.126 KB |
Page Load Time: 0.659801 Seconds |
Website IP Address: 172.67.72.95 |
Cybersecurity News and Analysis | Cybersecurity Dive link.cybersecuritydive.com |
EDR - Endpoint Detection Response Security by Hacker Combat edr.hackercombat.com |
Cybersecurity Exchange | Cybersecurity Courses, Training & Certification | EC-Council blog.eccouncil.org |
Sales Hacker The Worlds Largest Community for B2B Sales market.saleshacker.com |
Null Byte — The aspiring white-hat hacker/security awareness playground « Null Byte :: WonderHowTo null-byte.wonderhowto.com |
email hacker Download - Free email hacking tool capable of hacking email-hacker1.software.informer.com |
ASP.NET Hacker asp.net-hacker.rocks |
Hacker News news.ycombinator.com |
The Hacker News Deals deals.thehackernews.com |
YGN Ethical Hacker Group Blog bl0g.yehg.net |
Cybersecurity Lawyer Forum — Published by JMBM’s Cybersecurity and Privacy Group — Jeffer Mangels Bu cybersecurity.jmbm.com |
HaCkEd By RxR HaCkEr Green Acres Turf greenacres.sodwebdev.com |
Hacker News Search powered by Algolia hn.algolia.com |
Zeta-web Nigeria Limited – iWeek reseller, cybersecurity, EC Council, ethical Hacker, cybercrime, se znl.zeta-web.com |
The Hacker News | #1 Trusted Cybersecurity News Site https://thehackernews.com/ |
Accessibility https://deals.thehackernews.com/accessibility |
Terms https://deals.thehackernews.com/terms |
Defacement | News & Insights https://thehackernews.com/search/label/Defacement |
Instagram | News & Insights https://thehackernews.com/search/label/Instagram |
TikTok | News & Insights https://thehackernews.com/search/label/TikTok |
Microsoft | News & Insights https://thehackernews.com/search/label/Microsoft |
Pegasus | News & Insights https://thehackernews.com/search/label/Pegasus |
OSINT | News & Insights https://thehackernews.com/search/label/OSINT |
Adobe | News & Insights https://thehackernews.com/search/label/Adobe |
A thehackernews.com. 300 IN A 104.26.11.117 |
AAAA thehackernews.com. 300 IN AAAA 2606:4700:20::681a:a75 |
MX thehackernews.com. 300 IN MX 1 aspmx.l.google.com. |
NS thehackernews.com. 21600 IN NS kurt.ns.cloudflare.com. |
TXT thehackernews.com. 300 IN TXT adn_verification=thehackernews |
SOA thehackernews.com. 1800 IN SOA kurt.ns.cloudflare.com. dns.cloudflare.com. 2340745120 10000 2400 604800 1800 |
Date: Tue, 14 May 2024 10:12:37 GMT |
Content-Type: text/html; charset=UTF-8 |
Transfer-Encoding: chunked |
Connection: keep-alive |
CF-Ray: 883a1c641dde2094-IAD |
CF-Cache-Status: HIT |
Accept-Ranges: bytes |
Age: 183 |
Cache-Control: public, s-maxage=3600, max-age=0, stale-if-error=86400 |
Expires: Tue, 14 May 2024 10:09:34 GMT |
Last-Modified: Tue, 14 May 2024 09:50:13 GMT |
Strict-Transport-Security: max-age=15552000; includeSubDomains; preload |
Vary: Accept-Encoding |
Cf-Placement: local-IAD |
Content-Security-Policy: upgrade-insecure-requests |
Referrer-Policy: no-referrer-when-downgrade |
X-Content-Type-Options: nosniff |
X-Forwarded-For: 240e:390:9a7:3652::3de |
X-Frame-Options: SAMEORIGIN |
X-Powered-By: Google Frontend |
X-XSS-Protection: 1; mode=block |
Server: cloudflare |
alt-svc: h3=":443"; ma=86400 |
charset="utf-8"/ |
content="IE=9; IE=8; IE=7; IE=EDGE; chrome=1" http-equiv="X-UA-Compatible"/ |
content="index, follow, noarchive, max-image-preview:large, max-snippet:-1, max-video-preview:-1" name="robots"/ |
content="width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=6.0" name="viewport"/ |
content="yes" name="mobile-web-app-capable"/ |
content="yes" name="apple-mobile-web-app-capable"/ |
content="#3732b3" name="theme-color"/ |
content="#3732b3" name="msapplication-navbutton-color"/ |
content="#3732b3" name="apple-mobile-web-app-status-bar-style"/ |
content="280117418781535" property="fb:app_id"/ |
content="The Hacker News" property="og:site_name"/ |
content="en_US" property="og:locale"/ |
content="The Hacker News | #1 Trusted Cybersecurity News Site" name="twitter:title" property="og:title"/ |
content="The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and analysis." name="description"/ |
content="The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and analysis." property="og:description"/ |
content="The Hacker News is the most trusted and popular cybersecurity publication for information security professionals seeking breaking news, actionable insights and analysis." name="twitter:description"/ |
content="website" property="og:type"/ |
content="https://thehackernews.com/images/-AaptImXE5Y4/WzjvqBS8HtI/AAAAAAAAxSs/BcCIwpWJszILkuEbDfKZhxQJwOAD7qV6ACLcBGAs/s728-rw-e365/the-hacker-news.jpg" name="twitter:image" property="og:image"/ |
content="https://thehackernews.com/" property="og:url"/ |
content="@TheHackersNews" name="twitter:creator"/ |
content="@TheHackersNews" name="twitter:site"/ |
content="thehackernews.com" name="twitter:domain"/ |
content="summary_large_image" name="twitter:card"/ |
content="1251386282" property="fb:admins"/ |
content="172819872731894" property="fb:pages"/ |
content="cyber security news, cyber news, cyber security news today, cyber security updates, cyber updates, hacker news, hacking news, software vulnerability, cyber attacks, data breach, ransomware malware, how to hack, network security, information security, the hacker news, computer security" name="keywords"/ |
#1 Trusted Cybersecurity News Platform Followed by 4.50+ million Subscribe – Get Latest News Home Newsletter Webinars Home Data Breaches Cyber Attacks Vulnerabilities Webinars Store Contact Resources Webinars THN Store Free eBooks About Site About THN Jobs Advertise with us Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Telegram Channel Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices May 14, 2024 Location Tracking / Privacy Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to stealthily keep tabs on them without their knowledge or consent. "This will help mitigate the misuse of devices designed to help keep track of belongings," the companies said in a joint statement, adding it aims to address "potential risks to user privacy and safety." The proposal for a cross-platform solution was originally unveiled exactly a year ago by the two tech giants. The capability – dubbed " Detecting Unwanted Location Trackers " (DULT) – is available in Android devices running versions 6.0 and later, and iOS devices with iOS 17.5, which was officially shipped yesterday. As part of the industry specification, Android users will receive a "Tracker traveling with you" alert if an unidentified Bluetooth tracking device is detected as moving along with them over MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices May 13, 2024 The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. "The model provides a cultivated knowledge base of cyber threats to embedded devices, providing a common understanding of these threats with the security mechanisms required to mitigate them," the non-profit said in a post announcing the move. A draft version of the model, which has been conceived in collaboration with Niyo ’Little Thunder’ Pearson, Red Balloon Security, and Narf Industries, was previously released on December 13, 2023. EMB3D, like the ATT&CK framework , is expected to be a "living framework," with new and mitigations added and updated over time as new actors, vulnerabilities, and attack vectors emerge, but with a specific focus on embedded devices. The ultimate goal is to provide device vendors with a unified picture of different vulnerabilities in t The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield May 13, 2024 Browser Security / Data Protection With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the browser is a means for stealing sensitive data and accessing organizational systems. Security leaders who are planning their security architecture require data and insights into the browser threat landscape. Recently, LayerX released the " Annual Browser Security Report 2024 ", providing an in-depth analysis of the evolving threat landscape for browser security. This comprehensive report highlights the critical vulnerabilities and attack vectors that pose the greatest risks to enterprise security. It allows decision-makers and stakeholders to benchmark the security challenges of their environment so they can make actionable decisions. Below, we detail key findings from the report and a summarized list of security recommendations. We urge you to read the entire report , Guide: Secure Your Privileged Access with Our Expert-Approved Template Delinea IT Security / Access Control Security Transform your Privileged Access Management with our Policy Template—over 40 expertly crafted statements to elevate compliance and streamline your security. SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike May 13, 2024 Threat Detection / SoC / SIEM In the last decade, there has been a growing disconnect between front-line analysts and senior management in IT and Cybersecurity. Well-documented challenges facing modern analysts revolve around a high volume of alerts, false positives, poor visibility of technical environments, and analysts spending too much time on manual tasks. The Impact of Alert Fatigue and False Positives Analysts are overwhelmed with alerts. The knock-on effect of this is that fatigued analysts are at risk of missing key details in incidents, and often conduct time-consuming triaging tasks manually only to end up copying and pasting a generic closing comment into a false positive alert. It is likely that there will always be false positives. And many would argue that a false positive is better than a false negative. But for proactive actions to be made, we must move closer to the heart of an incident. That requires diving into how analysts conduct the triage and investigation process. SHQ Response Platfo Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries May 13, 2024 Vulnerability / IoT Security Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat actors to access sensitive information and achieve code execution. "These vulnerabilities include critical flaws that permit remote code execution and unauthorized privilege escalation, posing substantial risks to integral communication networks and IoT devices foundational to industrial, healthcare, automotive, financial and telecommunications sectors," Kaspersky said . Cinterion modems were originally developed by Gemalto before the business was acquired by Telit from Thales as part of a deal announced in July 2022. The findings were presented at the OffensiveCon held in Berlin on May 11. The list of eight flaws is as follows - CVE-2023-47610 (CVSS score: 8.1) - A buffer overflow vulnerability that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted S Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia May 13, 2024 Ransomware / Endpoint Security The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), the agencies said the threat actors encrypted and stole data from at least 12 out of 16 critical infrastructure sectors. "Black Basta affiliates use common initial access techniques — such as phishing and exploiting known vulnerabilities — and then employ a double-extortion model, both encrypting systems and exfiltrating data," the bulletin read . Unlike other ransomware groups, the ransom notes dropped at the end of the attack do not contain an initial ransom demand or payment instructions. Rather, the note Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo May 13, 2024 Software Security / Malware Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project’s logo. The package employing this steganographic trickery is requests-darwin-lite , which has been downloaded 417 times prior to it being taken down from the Python Package Index (PyPI)...
Domain Name: THEHACKERNEWS.COM Registry Domain ID: 1622465847_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.squarespace.domains Registrar URL: http://squarespace.domains Updated Date: 2024-02-02T08:31:03Z Creation Date: 2010-10-27T11:06:33Z Registry Expiry Date: 2026-10-27T11:06:33Z Registrar: Squarespace Domains LLC Registrar IANA ID: 3827 Registrar Abuse Contact Email: abuse-complaints@squarespace.com Registrar Abuse Contact Phone: 1-646-693-5324 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Name Server: KURT.NS.CLOUDFLARE.COM Name Server: MARIA.NS.CLOUDFLARE.COM DNSSEC: unsigned >>> Last update of whois database: 2024-05-17T19:48:15Z <<<