Friday, 1 March 2019

Hackers Favorite CoinHive Cryptocurrency Mining Service Shutting Down

The Hacker News Daily Updates
Newsletter
cover

8 Real World Use Cases for SOAR e-book

Less than 1 percent of critical security alarms are ever investigated. Automate 80-90 percent of your team's tasks with security orchestration, automation and response (SOAR).

Download Now Sponsored
LATEST NEWS Mar 1, 2019

Hackers Favorite CoinHive Cryptocurrency Mining Service Shutting Down

Coinhive, a notorious in-browser cryptocurrency mining service popular among cybercriminals, has announced that it will discontinue its services on March 8, 2019. Regular readers of The Hacker News already know how Coinhive's service helped cyber criminals earn hundreds of thousands of dollars by ...

Read More
Twitter Facebook LinkedIn

Learn Ethical Hacking with 180 Hours of Training — 2019 Course Bundle

The world of cybersecurity is fast-paced and ever-changing. New attacks are unleashed every day, and companies around the world lose millions of dollars as a result. The only thing standing in the way of cybercrime is a small army of ethical hackers. These cybersecurity experts are employed to ...

Read More
Twitter Facebook LinkedIn

Severe Flaws in SHAREit Android App Let Hackers Steal Your Files

Security researchers have discovered two high-severity vulnerabilities in the SHAREit Android app that could allow attackers to bypass device authentication mechanism and steal files containing sensitive from a victim's device. With over 1.5 billion users worldwide, SHAREit is a popular file ...

Read More
Twitter Facebook LinkedIn

New Flaws Re-Enable DMA Attacks On Wide Range of Modern Computers

Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux, and FreeBSD, allowing attackers to bypass protection mechanisms introduced to defend against DMA attacks. Known for years, Direct ...

Read More
Twitter Facebook LinkedIn

Latest WinRAR Flaw Being Exploited in the Wild to Hack Windows Computers

It's not just the critical Drupal vulnerability that is being exploited by in the wild cybercriminals to attack vulnerable websites that have not yet applied patches already available by its developers, but hackers are also exploiting a critical WinRAR vulnerability that was also revealed last ...

Read More
Twitter Facebook LinkedIn
cover

8 Real World Use Cases for SOAR e-book

Less than 1 percent of critical security alarms are ever investigated. Automate 80-90 percent of your team's tasks with security orchestration, automation and response (SOAR).

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment