Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems

The Hacker News Daily Updates
Newsletter
cover

Do Your Customers Trust You with Their Data?

How to prepare for the new era of data privacy.

Download Now Sponsored
LATEST NEWS Dec 5, 2022

New BMC Supply Chain Vulnerabilities Affect Servers from Dozens of Manufacturers

Three different security flaws have been disclosed in American Megatrends (AMI) MegaRAC Baseboard Management Controller (BMC) software that could lead to remote code execution on vulnerable servers. "The impact of exploiting these vulnerabilities include remote control of compromised servers, remote deployment of malware, ransomware and firmware implants, and server physical damage ...

Read More
Twitter Facebook LinkedIn

Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware

A new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor's offices and courts. "Although it disguises itself as a ransomware and extorts money from the victim for 'decrypting' data, [it] does not actually encrypt, but purposefully destroys data in the affected system," Kaspersky researchers Fedor Sinitsyn and Janis Zinchenko said in ...

Read More
Twitter Facebook LinkedIn

Hear About the Latest Tech Before Anyone Else

Join over 450K people who read Emerging Tech Brew - the 3x/week email delivering the latest tech news right to your inbox. From cybersecurity to AI - if it affects the world, we’ve got it covered. It’s free & only takes 5 minutes to read so there’s really no reason not to try ...

Read More
Twitter Facebook LinkedIn

When Being Attractive Gets Risky - How Does Your Attack Surface Look to an Attacker?

In the era of digitization and ever-changing business needs, the production environment has become a living organism. Multiple functions and teams within an organization can ultimately impact the way an attacker sees the organization's assets, or in other words, the external attack surface. This dramatically increases the need to define an exposure management strategy. To keep up with ...

Read More
Twitter Facebook LinkedIn

SiriusXM Vulnerability Lets Hackers Remotely Unlock and Start Connected Cars

Cybersecurity researchers have discovered a security vulnerability that exposes cars from Honda, Nissan, Infiniti, and Acura to remote attacks through a connected vehicle service provided by SiriusXM. The issue could be exploited to unlock, start, locate, and honk any car in an unauthorized manner just by knowing the vehicle's vehicle identification number (VIN), researcher Sam Curry said in ...

Read More
Twitter Facebook LinkedIn

North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps

The Lazarus Group threat actor has been observed leveraging fake cryptocurrency apps as a lure to deliver a previously undocumented version of the AppleJeus malware, according to new findings from Volexity. "This activity notably involves a campaign likely targeting cryptocurrency users and organizations with a variant of the AppleJeus malware by way of malicious Microsoft Office ...

Read More
Twitter Facebook LinkedIn

Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems

The maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be potentially exploited to crash the program or trigger remote code execution. The issue, assigned the identifier CVE-2022-23093, impacts all supported versions of FreeBSD and concerns a stack-based buffer overflow vulnerability in the ping service. ...

Read More
Twitter Facebook LinkedIn

Google Rolls Out New Chrome Browser Update to Patch Yet Another Zero-Day Vulnerability

Search giant Google on Friday released an out-of-band security update to fix a new actively exploited zero-day flaw in its Chrome web browser. The high-severity flaw, tracked as CVE-2022-4262, concerns a type confusion bug in the V8 JavaScript engine. Clement Lecigne of Google's Threat Analysis Group (TAG) has been credited with reporting the issue on November 29, 2022. Type ...

Read More
Twitter Facebook LinkedIn
cover

Do Your Customers Trust You with Their Data?

How to prepare for the new era of data privacy.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

WARNING: Hackers Exploiting Chrome Browser Zero-Day Vulnerability

Saturday, December 3, 2022

The Hacker News Daily Updates Newsletter cover Do Your Customers Trust You with Their Data? How to prepare for the new era of data privacy. Download Now Sponsored LATEST NEWS Dec 3, 2022 Google Rolls

Spanish IT Firm Caught Exploiting Chrome, Firefox, & Windows Zero-Day Vulnerabilities

Friday, December 2, 2022

The Hacker News Daily Updates Newsletter cover How to Use a Hacker's Toolkit Against Them How can you stay one step ahead of hackers targeting your employees to keep your organization safe?

Researchers 'Accidentally' Crash Cryptocurrency Mining Botnet Network

Thursday, December 1, 2022

The Hacker News Daily Updates Newsletter cover Mastering Cyber Intelligence ($19.99 Value) FREE for a Limited Time Cyber Threat Intelligence converts threat information into evidence-based intelligence

Cybersecurity Risk Hunting

Wednesday, November 30, 2022

The Hacker News eBook Update Newsletter Industrial Cybersecurity Pulse IT/OT eBook Download For Free Featured articles in this eBook include stories on extending IT security to the plant floor, IT/OT

French Electricity Provider Fined for Insecurely Storing Users' Passwords

Wednesday, November 30, 2022

The Hacker News Daily Updates Newsletter cover Cybersecurity Budget Tips that Deliver the Most Bang for Your Buck Discover the data behind which cybersecurity controls deliver the best ROI Download Now

You Might Also Like

March 6th 2025

Thursday, March 6, 2025

Curated news all about PHP. Here's the latest edition Is this email not displaying correctly? View it in your browser. PHP Weekly 6th March 2025 Hi everyone, It's the first issue of March. I

The Hidden Cost of Over-Engineering (and How to Stop Yourself)

Thursday, March 6, 2025

Top Tech Content sent at Noon! Augment Code: Developer AI for real eng work. Start for free Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, March 6,

JSK Weekly - 6th March, 2025

Thursday, March 6, 2025

The new Angular TextArea component by Syncfusion is a robust and flexible user interface element designed to enhance multiline text input. It offers a wide range of features and customization options,

wpmail.me issue#708

Thursday, March 6, 2025

wpMail.me wpmail.me issue#708 - The weekly WordPress newsletter. No spam, no nonsense. - March 6, 2025 Is this email not displaying correctly? View it in your browser. News & Articles The Top

This E-ZPass scam is everywhere ⚠️

Thursday, March 6, 2025

New Google Search; Don't use your CC online; Revert Apple Mail -- ZDNET ZDNET Tech Today - US March 6, 2025 e-zpass Did you get an E-ZPass text demanding payment? Don't click - it's a scam

⚙️ The era of agentic warfare

Thursday, March 6, 2025

Plus: Judge denies Musk's bid ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Post from Syncfusion Blogs on 03/06/2025

Thursday, March 6, 2025

New blogs from Syncfusion ® AI-Powered Flutter Calendar for Effortless Project Scheduling and Reviews By Lavanya Anaimuthu This blog explains how to build an AI-powered smart scheduling app using the

The Sequence Opinion #504: Does AI Need New Programming Languages?

Thursday, March 6, 2025

And some old computer science theories that can become sexy again in the era of AI-first programming languages. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations

Thursday, March 6, 2025

THN Daily Updates Newsletter cover ⚡ LIVE WEBINAR ➟ ASPM: The Future of AppSec -- Boom or Bust? Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions. Download Now

Is it time for you to get a VPN?

Thursday, March 6, 2025

Hello there, Most people don't think twice about online tracking. But the truth is, it's not just about targeted ads. Cybercriminals and scammers have ways of using your internet traffic