Hacking News

Latest hacking information from the underworld

Stack Clash flaws blow local root holes in loads of top Linux programs

Powerful programs run daily by users of Linux and other flavors of Unix are riddled with holes that can be exploited by logged-in miscreants to gain root privileges, researchers at Qualys have warned. Essentially, it’s possible to pull off a “Stack Clash” attack in various tools and applications to hijack the whole system, a situation […]

Stack Clash flaws blow local root holes in loads of top Linux programs Read More »

Cybersecurity breaches pose risk to business: Wipro

In a filing to the US Securities and Exchange Commission, IT major Wipro has stated that while there is an increase in the number of connected devices and transition to the cloud, there are also rising incidents of cyber security breaches which could pose a serious risk to business affecting financial prospects of companies. Such attacks

Cybersecurity breaches pose risk to business: Wipro Read More »

EU is thinking about banning the Encryption Backdoors

The European Parliament has introduced amended regulation that would not only require end-to-end encryption when convenient but forbid backdoors that offer secured access to law enforcement. EU citizens need to know that the “confidentiality and safety” of their data is “guaranteed,” according to the design, and backdoors risk “weakening” that privacy. Read more  

EU is thinking about banning the Encryption Backdoors Read More »

Breakthroughs in risk-based cyber attack detection

President Donald Trump’s Cybersecurity Executive Order supports increased security of critical infrastructure, with a renewed focus on a risk-based approach to mitigating security threats. It provides the opportunity to reexamine what a risk-based approach to cyber security means and how current security technologies are being applied across government and private sectors. Read more

Breakthroughs in risk-based cyber attack detection Read More »

Google’s war on terror: 4 ways the search giant is fighting extremism online

Google is ramping up its efforts in fighting extremist content online, detailing in a Sunday blog post four new efforts the company will be making to eliminate online terrorism. Online platforms like Facebook, Twitter, and Google have been used by extremists to share videos of executions, promote their ideology, and recruit new members. In the

Google’s war on terror: 4 ways the search giant is fighting extremism online Read More »

Is Your Chat Client Leaving You Exposed?

Popular third-party chat platforms like Slack, Discord, and Telegram are just a few of the many new productivity applications that are being hijacked by cybercriminals to create command-and-control (C&C) communications infrastructures for their malware campaigns. As corporate security teams become more aware of traditional malware threats and deploy new security solutions to defend against them,

Is Your Chat Client Leaving You Exposed? Read More »

Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access

Linux, BSD, Solaris and other open source systems are vulnerable to a local privilege escalation vulnerability known as Stack Clash that allows an attacker to execute code at root. Major Linux and open source distributors have made patches available today, and systems running Linux, OpenBSD, NetBSD, FreeBSD or Solaris on i386 or amd64 hardware should

Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access Read More »