Tuesday, 18 August 2020

Critical Jenkins Server Vulnerability Could Leak Sensitive Information

The Hacker News Daily Updates
Newsletter
cover

Hands-On AWS Penetration Testing with Kali Linux ($35.99 Value) FREE for a Limited Time

Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux

Download Now Sponsored
LATEST NEWS Aug 18, 2020

Critical Jenkins Server Vulnerability Could Leak Sensitive Information

Jenkins—a popular open-source automation server software—published an advisory on Monday concerning a critical vulnerability in the Jetty web server that could result in memory corruption and cause confidential information to be disclosed. Tracked as CVE-2019-17638, the flaw has a CVSS rating of ...

Read More
Twitter Facebook LinkedIn

Researchers Exploited A Bug in Emotet to Stop the Spread of Malware

Emotet, a notorious email-based malware behind several botnet-driven spam campaigns and ransomware attacks, contained a flaw that allowed cybersecurity researchers to activate a kill-switch and prevent the malware from infecting systems for six months. "Most of the vulnerabilities and exploits ...

Read More
Twitter Facebook LinkedIn

How AppTrana Managed Cloud WAF Tackles Evolving Attacking Techniques

Web applications suffer continuously evolving attacks, where a web application firewall (WAF) is the first line of defense and a necessary part of organizations' cybersecurity strategies. WAFs are getting more sophisticated all the time, but as its core protection starts with efficient pattern ...

Read More
Twitter Facebook LinkedIn

New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls

A team of academic researchers—who previously made the headlines earlier this year for uncovering severe security issues in the 4G LTE and 5G networks—today presented a new attack called 'ReVoLTE,' that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted ...

Read More
Twitter Facebook LinkedIn

Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills Remotely

Attention! If you use Amazon's voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely. Check Point cybersecurity researchers—Dikla Barda, Roman Zaikin and Yaara Shriki—today ...

Read More
Twitter Facebook LinkedIn
cover

Hands-On AWS Penetration Testing with Kali Linux ($35.99 Value) FREE for a Limited Time

Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment