Microsoft Details Gatekeeper Bypass Vulnerability in Apple macOS Systems

The Hacker News Daily Updates
Newsletter
cover

SANS Report: The State of ICS/OT Cybersecurity in 2022 and Beyond

The industrial control system (ICS)/operational technology (OT) security community is seeing attacks that go beyond traditional attacks on enterprise networks. Given the impacts to ICS/OT, fighting these attacks requires a different set of security skills, technologies, processes, and methods to manage the different risks and risk surfaces, setting ICS apart from traditional IT enterprise networks.

Download Now Sponsored
LATEST NEWS Dec 20, 2022

Beware: Cybercriminals Launch New BrasDex Android Trojan Targeting Brazilian Banking Users

The threat actors behind the Windows banking malware known as Casbaneiro has been attributed as behind a novel Android trojan called BrasDex that has been observed targeting Brazilian users as part of an ongoing multi-platform campaign. BrasDex features a "complex keylogging system designed to abuse Accessibility Services to extract credentials specifically from a set of Brazilian targeted ...

Read More
Twitter Facebook LinkedIn

Russian Hackers Targeted Petroleum Refinery in NATO Country During Ukraine War

The Russia-linked Gamaredon group attempted to unsuccessfully break into a large petroleum refining company within a NATO member state earlier this year amid the ongoing Russo-Ukrainian war. The attack, which took place on August 30, 2022, is just one of multiple attacks orchestrated by the advanced persistent threat (APT) that's attributed to Russia's Federal Security Service (FSB). ...

Read More
Twitter Facebook LinkedIn

A Guide to Efficient Patch Management with Action1

Keeping your software up to date is vital for cybersecurity. Read the patching strategy guide by Action1 and learn the best practices to identify, prioritize, and deploy updates effectively. Eliminate patching routine through automation and with a predictable plan at hand. Here are the key elements of the ...

Read More
Twitter Facebook LinkedIn

KmsdBot Botnet Suspected of Being Used as DDoS-for-Hire Service

An ongoing analysis of the KmsdBot botnet has raised the possibility that it's a DDoS-for-hire service offered to other threat actors. This is based on the different industries and geographies that were attacked, web infrastructure company Akamai said. Among the notable targets included FiveM and RedM, which are game modifications for Grand Theft Auto V and Red Dead Redemption 2, as well ...

Read More
Twitter Facebook LinkedIn

FTC Fines Fortnite Maker Epic Games $275 Million for Violating Children's Privacy Law

Epic Games has reached a $520 million settlement with the U.S. Federal Trade Commission (FTC) over allegations that the Fortnite creator violated online privacy laws for children and tricked users into making unintended purchases in the video game. To that end, the company will pay a record $275 million monetary penalty for breaching the Children's Online Privacy Protection Act (COPPA) ...

Read More
Twitter Facebook LinkedIn

Microsoft Details Gatekeeper Bypass Vulnerability in Apple macOS Systems

Microsoft has disclosed details of a now-patched security flaw in Apple macOS that could be exploited by an attacker to get around security protections imposed to prevent the execution of malicious applications. The shortcoming, dubbed Achilles (CVE-2022-42821, CVSS score: 5.5), was addressed by the iPhone maker in macOS Ventura 13, Monterey 12.6.2, and Big Sur 11.7.2, describing it as a ...

Read More
Twitter Facebook LinkedIn

Researchers Discover Malicious PyPI Package Posing as SentinelOne SDK to Steal Data

Cybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that impersonates a software development kit (SDK) for SentinelOne, a major cybersecurity company, as part of a campaign dubbed SentinelSneak. The package, named SentinelOne and now taken down, is said to have been published between December 8 and 11, 2022, with nearly two ...

Read More
Twitter Facebook LinkedIn

Glupteba Botnet Continues to Thrive Despite Google's Attempts to Disrupt It

The operators of the Glupteba botnet resurfaced in June 2022 as part of a renewed and "upscaled" campaign, months after Google disrupted the malicious activity. The ongoing attack is suggestive of the malware's resilience in the face of takedowns, cybersecurity company Nozomi Networks said in a write-up. "In addition, there was a tenfold increase in TOR hidden services being used as C2 ...

Read More
Twitter Facebook LinkedIn
cover

SANS Report: The State of ICS/OT Cybersecurity in 2022 and Beyond

The industrial control system (ICS)/operational technology (OT) security community is seeing attacks that go beyond traditional attacks on enterprise networks. Given the impacts to ICS/OT, fighting these attacks requires a different set of security skills, technologies, processes, and methods to manage the different risks and risk surfaces, setting ICS apart from traditional IT enterprise networks.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Google Takes Gmail Security to the Next Level with Client-Side Encryption

Monday, December 19, 2022

The Hacker News Daily Updates Newsletter cover SANS Report: The State of ICS/OT Cybersecurity in 2022 and Beyond The industrial control system (ICS)/operational technology (OT) security community is

New Actively Exploited Zero-Day Vulnerability Discovered in Apple Products

Friday, December 16, 2022

The Hacker News Daily Updates Newsletter cover Using the OWASP MASVS Security Standards Developers looking to lessen the impact of mobile application attacks need to build a strong mobile application

Mastering Cyber Intelligence ($19.99 Value) FREE for a Limited Time

Friday, December 16, 2022

The Hacker News eBook Update Newsletter Mastering Cyber Intelligence ($19.99 Value) FREE for a Limited Time Download For Free Cyber Threat Intelligence converts threat information into evidence-based

New Actively Exploited Zero-Day Vulnerability Discovered in Apple Products

Friday, December 16, 2022

The Hacker News Daily Updates Newsletter cover Developer-First Security Tools Buyers Guide Cloud computing environments are increasingly de!ned and controlled by infrastructure-as-code (ie Terraform),

Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability

Tuesday, December 13, 2022

The Hacker News Daily Updates Newsletter cover The 5 Dimensions of Data Maturity Webinar Download Now Sponsored LATEST NEWS Dec 13, 2022 Serious Attacks Could Have Been Staged Through This Amazon ECR

You Might Also Like

The Floater Manifesto 🛟

Wednesday, November 20, 2024

Some people use one operating system. I use many. Here's a version for your browser. Hunting for the end of the long tail • November 19, 2024 The Floater Manifesto Our technology should be good

Boost Elastic Skills & Break Limits in 2025!

Wednesday, November 20, 2024

Transforming Elastic Customer Support with GenAI ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ elastic | Search. Observe. Protect Get your annual pass Edu-Email-

📞 6 Foldable Phone Misconceptions Busted — What to Know About Family Cell Plans

Tuesday, November 19, 2024

Also: Use These Apps to Improve Spotify, and More! How-To Geek Logo November 19, 2024 Did You Know Despite the widely held misunderstanding that Franklin D. Roosevelt had polio, his health problems and

Debugging TUIs, Dictionary Comprehensions, Puzzles, and More

Tuesday, November 19, 2024

How to Debug Your Textual Application #656 – NOVEMBER 19, 2024 VIEW IN BROWSER The PyCoder's Weekly Logo How to Debug Your Textual Application TUI applications require a full terminal which most

Daily Coding Problem: Problem #1613 [Hard]

Tuesday, November 19, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by VMware. The skyline of a city is composed of several buildings of various widths and

Ranked | U.S. States vs. G7 Countries by GDP per Capita 📊

Tuesday, November 19, 2024

Why compare American states vs G7 economies? Answer: for a granular look at how America has left its peers in the dust. View Online | Subscribe | Download Our App Presented by: OANDA FEATURED STORY US

Spyglass Dispatch: Selling Chrome • Tech Tariffs • Masa Son's Bets • Alexa's Frustrations • Ex-Meta Lobbying • Apple's Missing Battery Pack

Tuesday, November 19, 2024

Selling Chrome • Tech Tariffs • Masa Son's Bets • Alexa's Frustrations • Ex-Meta Lobbying • Apple's Missing Battery Pack The Spyglass Dispatch is a free newsletter sent out daily on

A Go-powered MIDI sequencer

Tuesday, November 19, 2024

Plus a big GoLand release, developing a terminal app with Bubble Tea, and reflecting on the history of Unix. | #​532 — November 19, 2024 Unsub | Web Version Together with Blacksmith Go Weekly Mailpit:

Is AI Progress Slowing? The Scaling Debate OpenAI Doesn’t Want to Have

Tuesday, November 19, 2024

Top Tech Content sent at Noon! How the world collects web data Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, November 19, 2024? The HackerNoon

Webinar | Data Storytelling: What Organizations Need to Know Going into 2025 📈

Tuesday, November 19, 2024

A free webinar hosted by Visual Capitalist founder Jeff Desjardins. View email in browser In preparation for our new book "The Art of Data" and its speaking tour, we're giving you a sneak