Skip to content
hacker news Page 154

hacker news

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer

Jan 29, 2025Ravie LakshmananVulnerability / Software Security Broadcom has alerted of a high-severity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access. The vulnerability, tracked… 

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability

Jan 29, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning that a critical zero-day vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild. “Attackers can leverage this vulnerability to… 

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks

Jan 28, 2025Ravie LakshmananPhishing Attack / Network Security A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in… 

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

Jan 28, 2025Ravie Lakshmanan Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. “By exploiting this flaw, attackers can gain unauthorized access… 

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

Jan 28, 2025Ravie LakshmananRansomware / Threat Intelligence Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2)… 

How Long Does It Take Hackers to Crack Modern Hashing Algorithms?

How Long Does It Take Hackers to Crack Modern Hashing Algorithms?

While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are continually evolving. For example, NIST password recommendations are now prioritizing… 

E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries

E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries

Jan 28, 2025Ravie LakshmananCybersecurity / Cyber Espionage The Council of the European Union has sanctioned three individuals for allegedly carrying out “malicious cyber activities” against Estonia. The three Russian nationals – Nikolay Alexandrovich Korchagin, Vitaly… 

Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks

Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks

Jan 28, 2025Ravie LakshmananArtificial Intelligence / Technology DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent days, said it’s restricting registrations on the service, citing malicious attacks.… 

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

Jan 28, 2025Ravie LakshmananVulnerability / Endpoint Security Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability,…