Thursday, 20 December 2018

Microsoft Issues Emergency Patch For Under-Attack IE Zero Day

The Hacker News Daily Updates
Newsletter
cover

Linux System Logs and the Syslog Standard

Logs are extremely helpful for troubleshooting or catching minor issues before they become major problems. Linux administrators should know where logs are stored and how to manage them.

Download Now Sponsored
LATEST NEWS Dec 20, 2018

Microsoft Issues Emergency Patch For Under-Attack IE Zero Day

Microsoft today issued an out-of-band security update to patch a critical zero-day vulnerability in Internet Explorer (IE) Web browser that attackers are already exploiting in the wild to hack into Windows computers. Discovered by security researcher Clement Lecigne of Google's Threat Analysis ...

Read More
Twitter Facebook LinkedIn

Mayday! NASA Warns Employees of Personal Information Breach

Another day, another data breach. This time it's the United States National Aeronautics and Space Administration (NASA) NASA today confirmed a data breach that may have compromised personal information of some of its current and former employees after at least one of the agency's servers was ...

Read More
Twitter Facebook LinkedIn

Twitter Discloses Suspected State-Sponsored Attack After Minor Data Breach

Twitter has been hit with a minor data breach incident that the social networking site believes linked to a suspected state-sponsored attack. In a blog post published on Monday, Twitter revealed that while investigating a vulnerability affecting one of its support forms, the company discovered ...

Read More
Twitter Facebook LinkedIn

New Malware Takes Commands From Memes Posted On Twitter

Security researchers have discovered yet another example of how cybercriminals disguise their malware activities as regular traffic by using legitimate cloud-based services. Trend Micro researchers have uncovered a new piece of malware that retrieves commands from memes posted on a Twitter account ...

Read More
Twitter Facebook LinkedIn

Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers

Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as 'Magellan' by Tencent's Blade security team, the newly discovered SQLite flaw could allow remote attackers to execute arbitrary or ...

Read More
Twitter Facebook LinkedIn
cover

Linux System Logs and the Syslog Standard

Logs are extremely helpful for troubleshooting or catching minor issues before they become major problems. Linux administrators should know where logs are stored and how to manage them.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment