TheHackersNewsDrupal, the popular open-source content management system, has released security updates to address multiple "moderately critical" vulnerabilities in Drupal Core that could allow remote attackers to compromise the security of hundreds of thousands of websites. According to the advisories published today by the Drupal developers, all security vulnerabilities Drupal patched this month reside in...

TheHackersNewsNot a week goes without a new Facebook blunder. Remember the most recent revelation of Facebook being caught asking users new to the social network platform for their email account passwords to verify their identity? At the time, it was suspected that Facebook might be using access to users' email accounts to unauthorizedly and secretly gather a copy of their saved contacts. Now it turns...

TheHackersNewsFacebook late last month revealed that the social media company mistakenly stored passwords for "hundreds of millions" of Facebook users in plaintext, including "tens of thousands" passwords of its Instagram users as well. Now it appears that the incident is far worse than first reported. <!-- adsense --> Facebook today quietly updated its March press release, adding that the actual number of...

TheHackersNewsA white-hat hacker found a way to get into the French government's newly launched, secure encrypted messaging app that otherwise can only be accessed by officials and politicians with email accounts associated with the government identities. Dubbed "Tchap," the end-to-end encrypted, open source messaging app has been created by the French government with an aim to keep their officials,...

Dieses Content Management System hat es in sich, es deckt einen grossen Online Bereich ab.

Früher lange der Leader und bekannt als Dolphin wurde dieses System unter dem Namen UNA ständig weiterentwickelt.
UNA ist eine Full-Stack-Softwareplattform für den Aufbau benutzerdefinierter Community-Websites, sozialer Netzwerke und Collaboration Hubs.

Für mehr Infos besuchen Sie https://una.io. Zu diesem System existieren eine Menge Erweiterungen, welche Sie unter https://una.io/page/products-home finden. Support erhalten Sie im Forum unter: https://una.io/page/discussions-home

TheHackersNewsHigh-quality cybersecurity posture is typically regarded as the exclusive domain of the large and heavy resourced enterprises – those who can afford a multi-product security stack and a skilled security team to operate it. This implies a grave risk to all organizations who are not part of this group, since the modern threat landscape applies to all, regardless of size and vertical. What is...

TheHackersNewsElastic, the company behind the most widely used enterprise search engine ElasticSearch and the Elastic Stack, today announced that it has decided to make core security features of the Elastic Stack free and accessible to all users. ELK Stack or Elastic Stack is a collection of three powerful open source projects—Elasticsearch, Logstash, and Kibana—that many large and small companies are...

TheHackersNewsAn anonymous hacker with an online alias "SandboxEscaper" today released proof-of-concept (PoC) exploit code for a new zero-day vulnerability affecting Windows 10 operating system—that's his/her 5th publicly disclosed Windows zero-day exploit [1, 2, 3] in less than a year. Published on GitHub, the new Windows 10 zero-day vulnerability is a privilege escalation issue that could allow a local...

TheHackersNewsAfter Facebook and Twitter, Google becomes the latest technology giant to have accidentally stored its users' passwords unprotected in plaintext on its servers—meaning any Google employee who has access to the servers could have read them. In a blog post published Tuesday, Google revealed that its G Suite platform mistakenly stored unhashed passwords of some of its enterprise users on...

TheHackersNewsLess than 24 hours after publicly disclosing an unpatched zero-day vulnerability in Windows 10, the anonymous hacker going by online alias "SandboxEscaper" has now dropped new exploits for two more unpatched Microsoft zero-day vulnerabilities. The two new zero-day vulnerabilities affect Microsoft's Windows Error Reporting service and Internet Explorer 11. Just yesterday, while releasing a...

TheHackersNewsWohooo! Great news for privacy-focused users. Tor Browser, the most popular privacy-focused browser, for Android is finally out of beta, and the first stable version has now arrived on Google Play Store for anyone to download. The Tor Project announced Tuesday the first official stable release of its ultra-secure internet browser for Android devices, Tor Browser 8.5—which you can now...

securitymagazine.comSecurity executives have to be constant evangelists when it comes to preserving operational effectiveness....

securitymagazine.comLyft announced a new suite of safety features and programs for its riders....

securitymagazine.comThe Minnesota Senate has approved the House File 400, the Opioid Stewardship Fund bill....

securitymagazine.comThe Pepperdine School of Public Policy will form an academic enterprise with the Los Angeles Homeland Security Advisory Council (HSAC) focused on disaster preparedness, crisis management, and resiliency through engaging the public, private, and civic sectors....

securitymagazine.comInvestment firms are among the most security-conscious businesses, for good reason. In a day – or even an hour – of downtime is a disaster....

securitymagazine.comThe global property terrorism insurance market remains strong with sufficient capacity to respond to today’s predominant terrorist threats, according to the 2019 Terrorism Risk Insurance Report. ...

securitymagazine.comSocial media platforms such as Facebook, Twitter, Instagram, as well as specialized social networks and encrypted messaging apps have come under attack for facilitating violent extremism and serving as violent ideology laboratories...

securitymagazine.com(ISC)² announces that all nine of its cybersecurity certifications are now recognized by the International Accreditation Forum (IAF)....

threatpost.comA database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see....

threatpost.comHCL domain pages exposed sensitive data - including passwords and project analysis reports - for thousands of employees and customers....

threatpost.comA flaw in the Secure Boot trusted hardware root-of-trust affects enterprise, military and government network gear, including routers, switches and firewalls....

Weiter