15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects

The Hacker News Daily Updates
Newsletter
cover

Developer-Focused Security from Code to Cloud and Back to Code

Discover the importance of application security and cloud security teams working together to deliver more secure cloud native applications in this white paper.

Download Now Sponsored
LATEST NEWS Sep 22, 2022

IT Security Takeaways from the Wiseasy Hack

Last month Tech Crunch reported that payment terminal manufacturer Wiseasy had been hacked. Although Wiseasy might not be well known in North America, their Android-based payment terminals are widely used in the Asia Pacific region and hackers managed to steal passwords for 140,000 payment ...

Read More
Twitter Facebook LinkedIn

Researchers Disclose Critical Vulnerability in Oracle Cloud Infrastructure

Researchers have disclosed a new severe Oracle Cloud Infrastructure (OCI) vulnerability that could be exploited by users to access the virtual disks of other Oracle customers. "Each virtual disk in Oracle's cloud has a unique identifier called OCID," Shir Tamari, head of research at Wiz, said in a ...

Read More
Twitter Facebook LinkedIn

15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects

As many as 350,000 open source projects are believed to be potentially vulnerable to exploitation as a result of a security flaw in a Python module that has remained unpatched for 15 years. The open source repositories span a number of industry verticals, such as software development, artificial ...

Read More
Twitter Facebook LinkedIn

Hackers Targeting Unpatched Atlassian Confluence Servers to Deploy Crypto Miners

A now-patched critical security flaw affecting Atlassian Confluence Server that came to light a few months ago is being actively exploited for illicit cryptocurrency mining on unpatched installations. "If left unremedied and successfully exploited, this vulnerability could be used for multiple and ...

Read More
Twitter Facebook LinkedIn

Over 39,000 Unauthenticated Redis Instances Found Exposed on the Internet

An unknown attacker targeted tens of thousands of unauthenticated Redis servers exposed on the internet in an attempt to install a cryptocurrency miner. It's not immediately known if all of these hosts were successfully compromised. Nonetheless, it was made possible by means of a "lesser-known ...

Read More
Twitter Facebook LinkedIn
cover

SOC 2 Compliance: Why it matters and how to get there

Real-life guidance and advice from Trustero

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Top 5 ASM Use Cases Every Security Team Must Embrace Now

Wednesday, September 21, 2022

The Hacker News eBook Update Newsletter Top 5 ASM Use Cases Every Security Team Must Embrace Now Download For Free The attack surfaces of most organizations continue to expand due to the frantic rush

Record DDoS Attack with 25.3 Billion Requests Abused HTTP/2 Multiplexing

Wednesday, September 21, 2022

The Hacker News Daily Updates Newsletter cover Top 5 ASM Use Cases Every Security Team Must Embrace Now The attack surfaces of most organizations continue to expand due to the frantic rush to digital

Uber Blames LAPSUS$ Hacking Group for Recent Security Breach

Tuesday, September 20, 2022

The Hacker News Daily Updates Newsletter cover What's Ahead for the Cybersecurity Industry Cybersecurity Download Now Sponsored LATEST NEWS Sep 20, 2022 Russian Sandworm Hackers Impersonate

Hackers Had Access to LastPass's Development Systems for Four Days

Monday, September 19, 2022

The Hacker News Daily Updates Newsletter cover Redefining Data Loss Prevention (DLP) Why Today's Organizations Need a More Modern Approach to Data Loss Prevention Download Now Sponsored LATEST NEWS

U.S. Charges 3 Iranian Hackers and Sanctions Several Others Over Ransomware Attacks

Thursday, September 15, 2022

The Hacker News Daily Updates Newsletter cover Modern Blueprint to Insider Threat Management Taking a People-Centric Approach to Your Insider Threat Management (ITM) Program Download Now Sponsored

You Might Also Like

Stories, Free Tool & CRM Template

Tuesday, March 11, 2025

Notion stories, smart tools, and a free template to organize your contacts 🔥 ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

LW 173 - How to become a Shopify Developer in 2025

Tuesday, March 11, 2025

How to become a Shopify Developer in 2025 ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ Shopify Development news and articles Issue 173 - 03/11

This free AI tool beats Perplexity

Tuesday, March 11, 2025

Ubuntu vs. Debian; The new HR; YouTube randomizer -- ZDNET ZDNET Tech Today - US March 11, 2025 webfeetgettyimages-10141124 DuckDuckGo's AI beats Perplexity in one big way - and it's free to

⚙️ AI bubble bursts (?)

Tuesday, March 11, 2025

Plus: We talk to the CEO of Read AI ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Post from Syncfusion Blogs on 03/11/2025

Tuesday, March 11, 2025

New blogs from Syncfusion ® Build AI-Powered Smart Form Filling App Using WPF PDF Viewer By Vikas S Learn to effortlessly fill PDF forms with the AI-powered smart fill app using WPF PDF Viewer and

🥽 Is the VR Experiment a Failure? — Every 3D Mario Game Ranked

Tuesday, March 11, 2025

Also: Why We Miss Sliding Keyboard Phones, and More! How-To Geek Logo March 11, 2025 Did You Know Oprah Winfrey, of US daytime talk show fame, was christened Orpah Winfrey at birth (named after the

The Sequence Knowledge #507: Beyond Language: RAG for Other Modalities

Tuesday, March 11, 2025

How RAG can be used in computer vision, audio and other modalities. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

ALERT: New Polymorphic Attack Clones Browser Extensions to Steal Credentials

Tuesday, March 11, 2025

THN Daily Updates Newsletter cover ⚡ LIVE WEBINAR ➟ ASPM: The Future of AppSec -- Boom or Bust? Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions. Download Now

Re: You're Invited: Free Photo Management Class

Tuesday, March 11, 2025

This is your last chance to register for tomorrow's live online Photo Management Class, Wednesday, March 12, at 4:30 pm ET! Sign up now to attend the FREE Photo Management Class The recent changes

BetterDev #275 - Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges

Monday, March 10, 2025

Better Dev #275 Mar 10, 2025 Hi all, In the wave of ByBit exchange being hack for 1.6billion, and the hack is very sophisciated, exploit developer access key to change an s3 bucket. The attack start by