[{"title":"Fmt – A Modern Formatting Library","description":"<a href="https://news.ycombinator.com/item?id=23295280">Comments</a>","link":"https://github.com/fmtlib/fmt","comments":"https://news.ycombinator.com/item?id=23295280","updated_at":"2020-05-24T22:07:41+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23295280","link_host":"github.com","from":"hackernews"},{"title":"Original .NET garbage collector was written in Common Lisp","description":"<a href="https://news.ycombinator.com/item?id=23295041">Comments</a>","link":"https://twitter.com/rainerjoswig/status/1264664590853562368","comments":"https://news.ycombinator.com/item?id=23295041","updated_at":"2020-05-24T21:37:25+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23295041","link_host":"twitter.com","from":"hackernews"},{"title":"Ask HN: If you could work remote where would you live?","description":"<a href="https://news.ycombinator.com/item?id=23294799">Comments</a>","link":"https://news.ycombinator.com/item?id=23294799","comments":"https://news.ycombinator.com/item?id=23294799","updated_at":"2020-05-24T21:06:50+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23294799","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"With remote work plan, Facebook dashes hopes of paycheck arbitrage","description":"<a href="https://news.ycombinator.com/item?id=23294427">Comments</a>","link":"https://mobile.reuters.com/article/idUSKBN22Y1IA","comments":"https://news.ycombinator.com/item?id=23294427","updated_at":"2020-05-24T20:28:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23294427","link_host":"mobile.reuters.com","from":"hackernews"},{"title":"The Chiral Puzzle of Life","description":"<a href="https://news.ycombinator.com/item?id=23294294">Comments</a>","link":"https://iopscience.iop.org/article/10.3847/2041-8213/ab8dc6","comments":"https://news.ycombinator.com/item?id=23294294","updated_at":"2020-05-24T20:07:58+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23294294","link_host":"iopscience.iop.org","from":"hackernews"},{"title":"Hard-Coding Bottom-Up Code Generation Tables to Save Time and Space (1991) [pdf]","description":"<a href="https://news.ycombinator.com/item?id=23294244">Comments</a>","link":"http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=8E1E2F91F95973FD5873D5ABEB80A536?doi=10.1.1.15.397&rep=rep1&type=pdf","comments":"https://news.ycombinator.com/item?id=23294244","updated_at":"2020-05-24T20:00:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23294244","link_host":"citeseerx.ist.psu.edu","from":"hackernews"},{"title":"BaseSAFE: Baseband SAnitized Fuzzing Through Emulation","description":"<a href="https://news.ycombinator.com/item?id=23293714">Comments</a>","link":"https://arxiv.org/abs/2005.07797","comments":"https://news.ycombinator.com/item?id=23293714","updated_at":"2020-05-24T18:57:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23293714","link_host":"arxiv.org","from":"hackernews"},{"title":"Implementing simple cooperative threads in C","description":"<a href="https://news.ycombinator.com/item?id=23293642">Comments</a>","link":"https://brennan.io/2020/05/24/userspace-cooperative-multitasking/","comments":"https://news.ycombinator.com/item?id=23293642","updated_at":"2020-05-24T18:47:28+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23293642","link_host":"brennan.io","from":"hackernews"},{"title":"Writing and the narrative fallacy (2018)","description":"<a href="https://news.ycombinator.com/item?id=23293462">Comments</a>","link":"https://jacklimpert.com/2018/04/jeff-bezos-talks-about-writing-and-the-narrative-fallacy/","comments":"https://news.ycombinator.com/item?id=23293462","updated_at":"2020-05-24T18:26:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23293462","link_host":"jacklimpert.com","from":"hackernews"},{"title":"Lets Draw Together","description":"<a href="https://news.ycombinator.com/item?id=23293443">Comments</a>","link":"https://multiuser-sketchpad.glitch.me/","comments":"https://news.ycombinator.com/item?id=23293443","updated_at":"2020-05-24T18:23:45+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23293443","link_host":"multiusersketchpad.glitch.me","from":"hackernews"},{"title":"Caffeine: A vitamin-like nutrient, or adaptogen","description":"<a href="https://news.ycombinator.com/item?id=23293313">Comments</a>","link":"http://raypeat.com/articles/articles/caffeine.shtml","comments":"https://news.ycombinator.com/item?id=23293313","updated_at":"2020-05-24T18:07:15+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23293313","link_host":"raypeat.com","from":"hackernews"},{"title":"Self Supervised Learning in NLP","description":"<a href="https://news.ycombinator.com/item?id=23292885">Comments</a>","link":"https://amitness.com/2020/05/self-supervised-learning-nlp/","comments":"https://news.ycombinator.com/item?id=23292885","updated_at":"2020-05-24T17:07:17+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23292885","link_host":"amitness.com","from":"hackernews"},{"title":"Pantai Remis Landslide","description":"<a href="https://news.ycombinator.com/item?id=23292821">Comments</a>","link":"https://en.wikipedia.org/wiki/Pantai_Remis_landslide","comments":"https://news.ycombinator.com/item?id=23292821","updated_at":"2020-05-24T16:58:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23292821","link_host":"en.wikipedia.org","from":"hackernews"},{"title":"Running Lisp in Production (2015)","description":"<a href="https://news.ycombinator.com/item?id=23292805">Comments</a>","link":"https://www.grammarly.com/blog/engineering/running-lisp-in-production/","comments":"https://news.ycombinator.com/item?id=23292805","updated_at":"2020-05-24T16:55:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23292805","link_host":"www.grammarly.com","from":"hackernews"},{"title":"Most book clubs are doing it wrong (2017)","description":"<a href="https://news.ycombinator.com/item?id=23292749">Comments</a>","link":"http://jsomers.net/blog/book-clubs","comments":"https://news.ycombinator.com/item?id=23292749","updated_at":"2020-05-24T16:48:45+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23292749","link_host":"jsomers.net","from":"hackernews"},{"title":"Show HN: Bosconian (1981), in 3-D","description":"<a href="https://news.ycombinator.com/item?id=23291837">Comments</a>","link":"http://nolannicholson.com/bosco-3d/","comments":"https://news.ycombinator.com/item?id=23291837","updated_at":"2020-05-24T14:43:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23291837","link_host":"nolannicholson.com","from":"hackernews"},{"title":"The Big List of Naughty Strings","description":"<a href="https://news.ycombinator.com/item?id=23291458">Comments</a>","link":"https://github.com/minimaxir/big-list-of-naughty-strings","comments":"https://news.ycombinator.com/item?id=23291458","updated_at":"2020-05-24T13:44:56+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23291458","link_host":"github.com","from":"hackernews"},{"title":"One-Word Domains","description":"<a href="https://news.ycombinator.com/item?id=23291337">Comments</a>","link":"https://www.oneword.domains/","comments":"https://news.ycombinator.com/item?id=23291337","updated_at":"2020-05-24T13:26:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23291337","link_host":"www.oneword.domains","from":"hackernews"},{"title":"How to Create a Strong Value Proposition for B2B","description":"https://www.daniel-one.com/create-strong-value-proposition-b2b","link":"https://www.designernews.co/stories/109061-how-to-create-a-strong-value-proposition-for-b2b","comments":"https://www.designernews.co/stories/109061-how-to-create-a-strong-value-proposition-for-b2b","updated_at":"2020-05-24T13:13:59+00:00","link_to_comments":"https://www.designernews.co/stories/109061-how-to-create-a-strong-value-proposition-for-b2b","link_host":"www.danielone.com","from":"designernews"},{"title":"Don’t Be Afraid of RAID","description":"<a href="https://news.ycombinator.com/item?id=23290953">Comments</a>","link":"https://louwrentius.com/dont-be-afraid-of-raid.html","comments":"https://news.ycombinator.com/item?id=23290953","updated_at":"2020-05-24T12:13:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23290953","link_host":"louwrentius.com","from":"hackernews"},{"title":"Habits of High-Functioning Teams","description":"<a href="https://news.ycombinator.com/item?id=23290943">Comments</a>","link":"https://deniseyu.io/2020/05/23/habits-of-high-performing-teams.html","comments":"https://news.ycombinator.com/item?id=23290943","updated_at":"2020-05-24T12:11:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23290943","link_host":"deniseyu.io","from":"hackernews"},{"title":"Jepsen: MongoDB 4.2.6","description":"<a href="https://news.ycombinator.com/item?id=23290844">Comments</a>","link":"http://jepsen.io/analyses/mongodb-4.2.6","comments":"https://news.ycombinator.com/item?id=23290844","updated_at":"2020-05-24T11:42:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23290844","link_host":"jepsen.io","from":"hackernews"},{"title":"Tuxedo Book BA15: AMD-only and Linux-preinstalled laptop","description":"<a href="https://news.ycombinator.com/item?id=23290813">Comments</a>","link":"https://www.tuxedocomputers.com/en/Linux-Hardware/Linux-Notebooks/15-16-inch/TUXEDO-Book-BA15-Gen10.tuxedo","comments":"https://news.ycombinator.com/item?id=23290813","updated_at":"2020-05-24T11:32:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23290813","link_host":"www.tuxedocomputers.com","from":"hackernews"},{"title":"Linux 5.8 Set to Optionally Flush the L1d Cache on Context Switch","description":"<a href="https://news.ycombinator.com/item?id=23290443">Comments</a>","link":"https://www.phoronix.com/scan.php?page=news_item&px=L1d-Cache-Flushing-Queued","comments":"https://news.ycombinator.com/item?id=23290443","updated_at":"2020-05-24T09:55:17+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23290443","link_host":"www.phoronix.com","from":"hackernews"},{"title":"How the biggest consumer apps got their first 1k users","description":"<a href="https://news.ycombinator.com/item?id=23290154">Comments</a>","link":"https://www.lennyrachitsky.com/p/how-the-biggest-consumer-apps-got","comments":"https://news.ycombinator.com/item?id=23290154","updated_at":"2020-05-24T08:45:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23290154","link_host":"www.lennyrachitsky.com","from":"hackernews"},{"title":"Testing Distributed Systems with Deterministic Simulation (2014) [video]","description":"<a href="https://news.ycombinator.com/item?id=23289593">Comments</a>","link":"https://www.youtube.com/watch?v=4fFDFbi3toc","comments":"https://news.ycombinator.com/item?id=23289593","updated_at":"2020-05-24T06:26:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23289593","link_host":"www.youtube.com","from":"hackernews"},{"title":"Guide to Concurrency in Python with Asyncio","description":"<a href="https://news.ycombinator.com/item?id=23289563">Comments</a>","link":"https://www.integralist.co.uk/posts/python-asyncio/","comments":"https://news.ycombinator.com/item?id=23289563","updated_at":"2020-05-24T06:18:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23289563","link_host":"www.integralist.co.uk","from":"hackernews"},{"title":"Tutorial: how to create neomorphic web components/elements with only CSS and HTML","description":"https://themesberg.com/blog/tutorial/neomorphic-elements-css-html-tutorial","link":"https://www.designernews.co/stories/109058-tutorial-how-to-create-neomorphic-web-componentselements-with-only-css-and-html","comments":"https://www.designernews.co/stories/109058-tutorial-how-to-create-neomorphic-web-componentselements-with-only-css-and-html","updated_at":"2020-05-23T13:31:59+00:00","link_to_comments":"https://www.designernews.co/stories/109058-tutorial-how-to-create-neomorphic-web-componentselements-with-only-css-and-html","link_host":"themesberg.com","from":"designernews"},{"title":"MiniConf: A Virtual Conference in a Box","description":"<a href="https://news.ycombinator.com/item?id=23282113">Comments</a>","link":"https://mini-conf.github.io/index.html","comments":"https://news.ycombinator.com/item?id=23282113","updated_at":"2020-05-23T11:35:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23282113","link_host":"miniconf.github.io","from":"hackernews"},{"title":"The Challenge of Cross-language Interoperability (2013)","description":"<a href="https://news.ycombinator.com/item?id=23281690">Comments</a>","link":"https://queue.acm.org/detail.cfm?id=2543971","comments":"https://news.ycombinator.com/item?id=23281690","updated_at":"2020-05-23T10:08:34+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23281690","link_host":"queue.acm.org","from":"hackernews"},{"title":"Page Automator, Figma Plugin to automate creating pages!","description":"https://www.figma.com/community/plugin/841201477778898873/Page-Automator","link":"https://www.designernews.co/stories/109054-page-automator-figma-plugin-to-automate-creating-pages","comments":"https://www.designernews.co/stories/109054-page-automator-figma-plugin-to-automate-creating-pages","updated_at":"2020-05-23T06:45:30+00:00","link_to_comments":"https://www.designernews.co/stories/109054-page-automator-figma-plugin-to-automate-creating-pages","link_host":"www.figma.com","from":"designernews"},{"title":"Inspiration board on Figma","description":"https://www.figma.com/community/file/845716796885667264","link":"https://www.designernews.co/stories/109053-inspiration-board-on-figma","comments":"https://www.designernews.co/stories/109053-inspiration-board-on-figma","updated_at":"2020-05-22T17:43:26+00:00","link_to_comments":"https://www.designernews.co/stories/109053-inspiration-board-on-figma","link_host":"www.figma.com","from":"designernews"},{"title":"Keyframes.app - an interactive CSS toolbox to make animations, box-shadows, colors, and more","description":"https://keyframes.app","link":"https://www.designernews.co/stories/109052-keyframesapp--an-interactive-css-toolbox-to-make-animations-boxshadows-colors-and-more","comments":"https://www.designernews.co/stories/109052-keyframesapp--an-interactive-css-toolbox-to-make-animations-boxshadows-colors-and-more","updated_at":"2020-05-22T16:12:04+00:00","link_to_comments":"https://www.designernews.co/stories/109052-keyframesapp--an-interactive-css-toolbox-to-make-animations-boxshadows-colors-and-more","link_host":"keyframes.app","from":"designernews"},{"title":"Simple Hover Design on Adobe XD","description":"https://www.youtube.com/watch?v=BYUNBVZuPXQ","link":"https://www.designernews.co/stories/109049-simple-hover-design-on-adobe-xd","comments":"https://www.designernews.co/stories/109049-simple-hover-design-on-adobe-xd","updated_at":"2020-05-22T14:55:18+00:00","link_to_comments":"https://www.designernews.co/stories/109049-simple-hover-design-on-adobe-xd","link_host":"www.youtube.com","from":"designernews"},{"title":"New logo and website design for Capture One","description":"https://www.captureone.com/en/","link":"https://www.designernews.co/stories/109045-new-logo-and-website-design-for-capture-one","comments":"https://www.designernews.co/stories/109045-new-logo-and-website-design-for-capture-one","updated_at":"2020-05-22T12:05:21+00:00","link_to_comments":"https://www.designernews.co/stories/109045-new-logo-and-website-design-for-capture-one","link_host":"www.captureone.com","from":"designernews"},{"title":"A 1973 IBM Selectric typeball recorded dancers' body movements","description":"<a href="https://news.ycombinator.com/item?id=23270785">Comments</a>","link":"https://www.ibm.com/blogs/industries/selectric-typewriter-dancers/","comments":"https://news.ycombinator.com/item?id=23270785","updated_at":"2020-05-22T11:08:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23270785","link_host":"www.ibm.com","from":"hackernews"},{"title":"The illusion of fast function","description":"https://uxdesign.cc/illusion-of-fast-function-2071b2c8be08","link":"https://www.designernews.co/stories/109043-the-illusion-of-fast-function","comments":"https://www.designernews.co/stories/109043-the-illusion-of-fast-function","updated_at":"2020-05-22T09:40:30+00:00","link_to_comments":"https://www.designernews.co/stories/109043-the-illusion-of-fast-function","link_host":"uxdesign.cc","from":"designernews"},{"title":"Will My Job Give Me Covid-19? (from the creators of Will Robots Take My Job?)","description":"http://willmyjobgivemecovid.com/","link":"https://www.designernews.co/stories/109039-will-my-job-give-me-covid19-from-the-creators-of-will-robots-take-my-job","comments":"https://www.designernews.co/stories/109039-will-my-job-give-me-covid19-from-the-creators-of-will-robots-take-my-job","updated_at":"2020-05-22T07:35:22+00:00","link_to_comments":"https://www.designernews.co/stories/109039-will-my-job-give-me-covid19-from-the-creators-of-will-robots-take-my-job","link_host":"willmyjobgivemecovid.com","from":"designernews"},{"title":"My New FreeBSD Laptop: Dell Latitude 7390","description":"<a href="https://news.ycombinator.com/item?id=23267834">Comments</a>","link":"http://www.daemonology.net/blog/2020-05-22-my-new-FreeBSD-laptop-Dell-7390.html","comments":"https://news.ycombinator.com/item?id=23267834","updated_at":"2020-05-22T01:35:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=23267834","link_host":"www.daemonology.net","from":"hackernews"},{"title":"Headspace UX Case study: balancing free and paid content","description":"https://medium.muz.li/headspace-ux-case-study-balancing-free-and-paid-content-73a418a18d69","link":"https://www.designernews.co/stories/109032-headspace-ux-case-study-balancing-free-and-paid-content","comments":"https://www.designernews.co/stories/109032-headspace-ux-case-study-balancing-free-and-paid-content","updated_at":"2020-05-21T15:08:32+00:00","link_to_comments":"https://www.designernews.co/stories/109032-headspace-ux-case-study-balancing-free-and-paid-content","link_host":"medium.muz.li","from":"designernews"},{"title":"The Easiest Guide to Webflow for Beginners","description":"Hi DesignerNews!\n\nWebflow is getting massively popular. And in my eyes an incredible way how to step up your web design/prototyping game. So I've decided to write down all of the important bits and pieces about Webflow that I learned and incorporated into my daily work. These will help you jump quickly into creating without wondering which elements you should use and struggling to find a way around the interface. I've also recorded all of the tips in a relatively short Youtube video! Let me know what do you think and if you are planning on moving to Webflow as well!\n\n*P.S.: This guide is completely non-technical, in fact — I moved to Webflow as a designer and can’t on my own write a single line of code, yet I'm now delivering clients fully functional websites.*\n\n**Medium Article**: https://medium.com/@JanLosert/webflow-uncovered-the-easiest-guide-for-beginners-45358aa5839d?source=friends_link&sk=a46932ee91c9e0cc2d212f15063cadb4\n\n**Youtube Video**: https://www.youtube.com/watch?v=_GkdN96j3I0","link":"https://www.designernews.co/stories/109028-the-easiest-guide-to-webflow-for-beginners","comments":"https://www.designernews.co/stories/109028-the-easiest-guide-to-webflow-for-beginners","updated_at":"2020-05-21T12:07:16+00:00","link_to_comments":"https://www.designernews.co/stories/109028-the-easiest-guide-to-webflow-for-beginners","link_host":null,"from":"designernews"},{"title":"How Cybersecurity Enables Government, Health, EduTech Cope With COVID-19","description":"The advent of the Covid-19 pandemic and the impact on our society has resulted in many dramatic changes to how people are traveling, interacting with each other, and collaborating at work.\n\nThere are several trends taking place as a consequence of the outbreak, which has only continued to heighten the need for the tightest possible cybersecurity.\n\n\nTools for Collaboration\n\nThere has been a<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8tUtNsxNQqc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/8tUtNsxNQqc/covid-19-cybersecurity.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8tUtNsxNQqc/covid-19-cybersecurity.html","updated_at":"2020-05-21T11:34:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8tUtNsxNQqc/covid-19-cybersecurity.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Awesome European Racing Cars from 80' illustrated ","description":"https://www.sicknico.com/jazdenky?fbclid=IwAR292V4NLvIHg12-dywAd3ypOtNKEV6btAUUM2FEpxO0-6rPMHREt14TrtE","link":"https://www.designernews.co/stories/109025-awesome-european-racing-cars-from-80-illustrated-","comments":"https://www.designernews.co/stories/109025-awesome-european-racing-cars-from-80-illustrated-","updated_at":"2020-05-21T09:20:34+00:00","link_to_comments":"https://www.designernews.co/stories/109025-awesome-european-racing-cars-from-80-illustrated-","link_host":"www.sicknico.com","from":"designernews"},{"title":"Iranian APT Group Targets Governments in Kuwait and Saudi Arabia","description":"Today, cybersecurity researchers shed light on an Iranian cyber espionage campaign directed against critical infrastructures in Kuwait and Saudi Arabia.\n\nBitdefender said the intelligence-gathering operations were conducted by Chafer APT (also known as APT39 or Remix Kitten), a threat actor known for its attacks on telecommunication and travel industries in the Middle East to collect personal<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/2m27rfRz1GU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/2m27rfRz1GU/iran-hackers-kuwait.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2m27rfRz1GU/iran-hackers-kuwait.html","updated_at":"2020-05-21T08:11:42+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2m27rfRz1GU/iran-hackers-kuwait.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Bluetooth Vulnerability Exposes Billions of Devices to Hackers","description":"Academics from École Polytechnique Fédérale de Lausanne (EPFL) disclosed a security vulnerability in Bluetooth that could potentially allow an attacker to spoof a remotely paired device, exposing over a billion of modern devices to hackers.\n\nThe attacks, dubbed Bluetooth Impersonation AttackS or BIAS, concern Bluetooth Classic, which supports Basic Rate (BR) and Enhanced Data Rate (EDR) for<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/jbyug0Ugy9A" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/jbyug0Ugy9A/hacking-bluetooth-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jbyug0Ugy9A/hacking-bluetooth-vulnerability.html","updated_at":"2020-05-21T07:02:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jbyug0Ugy9A/hacking-bluetooth-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hello Worthi","description":"Hello Design Gang,\n\nVentures Studio launched today a new product to help people grow skills and know what skills they can use to transfer to a new role.\n\nGive it a try!\nhttps://www.helloworthi.com","link":"https://www.designernews.co/stories/109024-hello-worthi","comments":"https://www.designernews.co/stories/109024-hello-worthi","updated_at":"2020-05-21T06:34:49+00:00","link_to_comments":"https://www.designernews.co/stories/109024-hello-worthi","link_host":"www.helloworthi.com","from":"designernews"},{"title":"Cute Illustrations - Created on Procreate","description":"https://elinostberg.com/","link":"https://www.designernews.co/stories/109019-cute-illustrations--created-on-procreate","comments":"https://www.designernews.co/stories/109019-cute-illustrations--created-on-procreate","updated_at":"2020-05-20T20:12:26+00:00","link_to_comments":"https://www.designernews.co/stories/109019-cute-illustrations--created-on-procreate","link_host":"elinostberg.com","from":"designernews"},{"title":"Detailed Logo Design Tutorial using Procreate","description":"https://www.youtube.com/watch?v=-LnTbxzGUtc","link":"https://www.designernews.co/stories/109010-detailed-logo-design-tutorial-using-procreate","comments":"https://www.designernews.co/stories/109010-detailed-logo-design-tutorial-using-procreate","updated_at":"2020-05-20T13:49:42+00:00","link_to_comments":"https://www.designernews.co/stories/109010-detailed-logo-design-tutorial-using-procreate","link_host":"www.youtube.com","from":"designernews"},{"title":"[Guide] Finding Best Security Outsourcing Alternative for Your Organization","description":"As cyberattacks continue to proliferate in volume and increase in sophistication, many organizations acknowledge that some part of their breach protection must be outsourced, introducing a million-dollar question of what type of service to choose form.\n\nToday, Cynet releases the Security Outsourcing Guide (download here), providing IT Security executives with clear and actionable guidance on<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/upmFwXa0MTg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/upmFwXa0MTg/best-security-outsourcing.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/upmFwXa0MTg/best-security-outsourcing.html","updated_at":"2020-05-20T13:11:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/upmFwXa0MTg/best-security-outsourcing.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Design Articles Without The Paywall: Open Stories","description":"https://prototypr.io/post/design-articles-without-the-paywall-open-stories/","link":"https://www.designernews.co/stories/109008-design-articles-without-the-paywall-open-stories","comments":"https://www.designernews.co/stories/109008-design-articles-without-the-paywall-open-stories","updated_at":"2020-05-20T11:48:28+00:00","link_to_comments":"https://www.designernews.co/stories/109008-design-articles-without-the-paywall-open-stories","link_host":"prototypr.io","from":"designernews"},{"title":"New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks","description":"Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service (DDoS) attacks to takedown targeted websites.\n\nCalled NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker's choice,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/sokrg1_SIcw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/sokrg1_SIcw/dns-server-ddos-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sokrg1_SIcw/dns-server-ddos-attack.html","updated_at":"2020-05-20T11:16:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sokrg1_SIcw/dns-server-ddos-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ukrainian Police Arrest Hacker Who Tried Selling Billions of Stolen Records","description":"The Ukrainian police have arrested a hacker who made headlines in January last year by posting a massive database containing some 773 million stolen email addresses and 21 million unique plaintext passwords for sale on various underground hacking forums.\n\nIn an official statement released on Tuesday, the Security Service of Ukraine (SBU) said it identified the hacker behind the pseudonym "Sanix<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/h62RNJdGr4U" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/h62RNJdGr4U/ukrainian-hacker-arrested.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/h62RNJdGr4U/ukrainian-hacker-arrested.html","updated_at":"2020-05-20T10:33:03+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/h62RNJdGr4U/ukrainian-hacker-arrested.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Plaster 2 - Mobile Design Kit for Android & iOS","description":"https://plasterdesignsystem.com/","link":"https://www.designernews.co/stories/109007-plaster-2--mobile-design-kit-for-android--ios","comments":"https://www.designernews.co/stories/109007-plaster-2--mobile-design-kit-for-android--ios","updated_at":"2020-05-20T09:11:19+00:00","link_to_comments":"https://www.designernews.co/stories/109007-plaster-2--mobile-design-kit-for-android--ios","link_host":"plasterdesignsystem.com","from":"designernews"},{"title":"What was most annoying part of preparing UX Case Study for your portfolio?","description":"Like on Medium or Behance or for your personal website.","link":"https://www.designernews.co/stories/109005-what-was-most-annoying-part-of-preparing-ux-case-study-for-your-portfolio","comments":"https://www.designernews.co/stories/109005-what-was-most-annoying-part-of-preparing-ux-case-study-for-your-portfolio","updated_at":"2020-05-20T06:51:26+00:00","link_to_comments":"https://www.designernews.co/stories/109005-what-was-most-annoying-part-of-preparing-ux-case-study-for-your-portfolio","link_host":null,"from":"designernews"},{"title":"The COVID-19 Freelancer Email Template","description":"https://folyo.me/blog/freelancing-during-covid-pandemic/","link":"https://www.designernews.co/stories/109002-the-covid19-freelancer-email-template","comments":"https://www.designernews.co/stories/109002-the-covid19-freelancer-email-template","updated_at":"2020-05-19T22:44:21+00:00","link_to_comments":"https://www.designernews.co/stories/109002-the-covid19-freelancer-email-template","link_host":"folyo.me","from":"designernews"},{"title":"Webflow announces its World Tour 2020","description":"https://webflow.com/blog/announcing-webflow-world-tour","link":"https://www.designernews.co/stories/108996-webflow-announces-its-world-tour-2020","comments":"https://www.designernews.co/stories/108996-webflow-announces-its-world-tour-2020","updated_at":"2020-05-19T16:42:04+00:00","link_to_comments":"https://www.designernews.co/stories/108996-webflow-announces-its-world-tour-2020","link_host":"webflow.com","from":"designernews"},{"title":"Smooth & Beautiful Scroll Animation Using Vanilla Javascript Plugin Lax.js","description":"Tutorial is here [Watch Now](https://youtu.be/KNO7gL-zicE)","link":"https://www.designernews.co/stories/108994-smooth--beautiful-scroll-animation-using-vanilla-javascript-plugin-laxjs","comments":"https://www.designernews.co/stories/108994-smooth--beautiful-scroll-animation-using-vanilla-javascript-plugin-laxjs","updated_at":"2020-05-19T16:35:15+00:00","link_to_comments":"https://www.designernews.co/stories/108994-smooth--beautiful-scroll-animation-using-vanilla-javascript-plugin-laxjs","link_host":"youtu.be","from":"designernews"},{"title":"Brazil's Biggest Cosmetic Brand Natura Exposes Personal Details of Its Users","description":"Brazil's biggest cosmetics company Natura accidentally left hundreds of gigabytes of its customers' personal and payment-related information publicly accessible online that could have been accessed by anyone without authentication.\n\nSafetyDetective researcher Anurag Sen last month discovered two unprotected Amazon-hosted servers—with 272GB and 1.3TB in size—belonging to Natura that consisted of<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/nXmT7BETy1Y" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/nXmT7BETy1Y/natura-data-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/nXmT7BETy1Y/natura-data-breach.html","updated_at":"2020-05-19T16:18:47+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/nXmT7BETy1Y/natura-data-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Framer Web now available","description":"https://www.framer.com/","link":"https://www.designernews.co/stories/108990-framer-web-now-available","comments":"https://www.designernews.co/stories/108990-framer-web-now-available","updated_at":"2020-05-19T15:07:57+00:00","link_to_comments":"https://www.designernews.co/stories/108990-framer-web-now-available","link_host":"www.framer.com","from":"designernews"},{"title":"British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers' Data","description":"British low-cost airline EasyJet today admitted that the company has fallen victim to a cyber-attack, which it labeled "highly sophisticated," exposing email addresses and travel details of around 9 million of its customers.\n\nIn an official statement released today, EasyJet confirmed that of the 9 million affected users, a small subset of customers, i.e., 2,208 customers, have also had their<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/eR24i2Vlrfk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/eR24i2Vlrfk/easyjet-data-breach-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eR24i2Vlrfk/easyjet-data-breach-hacking.html","updated_at":"2020-05-19T13:50:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eR24i2Vlrfk/easyjet-data-breach-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"5 Things to Know to Become a Successful Digital Product Designer","description":"https://uxplanet.org/5-things-to-know-to-become-a-successful-digital-product-designer-ad8e13d3c90e","link":"https://www.designernews.co/stories/108988-5-things-to-know-to-become-a-successful-digital-product-designer","comments":"https://www.designernews.co/stories/108988-5-things-to-know-to-become-a-successful-digital-product-designer","updated_at":"2020-05-19T09:55:59+00:00","link_to_comments":"https://www.designernews.co/stories/108988-5-things-to-know-to-become-a-successful-digital-product-designer","link_host":"uxplanet.org","from":"designernews"},{"title":"YouTube Videos for Designers and Developers","description":"https://www.peekstv.com","link":"https://www.designernews.co/stories/108987-youtube-videos-for-designers-and-developers","comments":"https://www.designernews.co/stories/108987-youtube-videos-for-designers-and-developers","updated_at":"2020-05-19T09:21:02+00:00","link_to_comments":"https://www.designernews.co/stories/108987-youtube-videos-for-designers-and-developers","link_host":"www.peekstv.com","from":"designernews"},{"title":"Sponsor: Biggest Lessons Learned From Experience Design Experts","description":"https://adobe.ly/3bFvc0s","link":"https://www.designernews.co/stories/108970-sponsor-biggest-lessons-learned-from-experience-design-experts","comments":"https://www.designernews.co/stories/108970-sponsor-biggest-lessons-learned-from-experience-design-experts","updated_at":"2020-05-18T14:41:54+00:00","link_to_comments":"https://www.designernews.co/stories/108970-sponsor-biggest-lessons-learned-from-experience-design-experts","link_host":"adobe.ly","from":"designernews"},{"title":"HTTP Status Codes Command This Malware How to Control Hacked Systems","description":"A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe.\n\nThe cyberespionage malware—traced to Turla APT with "medium-to-low level of confidence" based on the history of compromised victims—spread via an initial dropper that masks itself as<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/P0g3H2YLRTs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/P0g3H2YLRTs/malware-http-codes.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/P0g3H2YLRTs/malware-http-codes.html","updated_at":"2020-05-15T09:43:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/P0g3H2YLRTs/malware-http-codes.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Effective Business Continuity Plans Require CISOs to Rethink WAN Connectivity","description":"As more businesses leverage remote, mobile, and temporary workforces, the elements of business continuity planning are evolving and requiring that IT professionals look deep into the nuts and bolts of connectivity.\n\nCISOs and their team members are facing new challenges each and every day, many of which have been driven by digital transformation, as well as the adoption of other<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1mVmJ6muRjk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1mVmJ6muRjk/rethink-wan-connectivity.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1mVmJ6muRjk/rethink-wan-connectivity.html","updated_at":"2020-05-14T11:16:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1mVmJ6muRjk/rethink-wan-connectivity.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Improper Microsoft Patch for Reverse RDP Attacks Leaves 3rd-Party RDP Clients Vulnerable","description":"Remember the Reverse RDP Attack—wherein a client system vulnerable to a path traversal vulnerability could get compromised when remotely accessing a server over Microsoft's Remote Desktop Protocol?\n\nThough Microsoft had patched the vulnerability (CVE-2019-0887) as part of its July 2019 Patch Tuesday update, it turns out researchers were able to bypass the patch just by replacing the backward<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ZfVllQAorc0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZfVllQAorc0/reverse-rdp-attack-patch.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZfVllQAorc0/reverse-rdp-attack-patch.html","updated_at":"2020-05-14T10:24:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZfVllQAorc0/reverse-rdp-attack-patch.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"U.S Defense Warns of 3 New Malware Used by North Korean Hackers","description":"Yesterday, on the 3rd anniversary of the infamous global WannaCry ransomware outbreak for which North Korea was blamed, the U.S. government released information about three new malware strains used by state-sponsored North Korean hackers.\n\nCalled COPPERHEDGE, TAINTEDSCRIBE, and PEBBLEDASH, the malware variants are capable of remote reconnaissance and exfiltration of sensitive information from<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/rfDx8P1GD8U" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/rfDx8P1GD8U/fbi-north-korean-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rfDx8P1GD8U/fbi-north-korean-malware.html","updated_at":"2020-05-13T15:04:23+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rfDx8P1GD8U/fbi-north-korean-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Researcher Spots New Malware Claimed to be 'Tailored for Air‑Gapped Networks'","description":"A cybersecurity researcher at ESET today published an analysis of a new piece of malware, a sample of which they spotted on the Virustotal malware scanning engine and believe the hacker behind it is likely interested in some high-value computers protected behind air‑gapped networks.\n\nDubbed 'Ramsay,' the malware is still under development with two more variants (v2.a and v2.b) spotted in the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bfDPCQF6AFk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bfDPCQF6AFk/airgap-network-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bfDPCQF6AFk/airgap-network-malware.html","updated_at":"2020-05-13T14:54:43+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bfDPCQF6AFk/airgap-network-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Cynet Offers IR Specialists Grants up to $1500 for each IR Engagement","description":"In the past, the autonomous breach protection company Cynet announced that it is making Cynet 360 threat detection and response platform available at no charge for IR (incident response) service providers and consultants.\n\nToday Cynet takes another step and announces a $500 grant for Incident Responders for each IR engagement in which Cynet 360 was used, with an additional $1,000 grant if the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-7xyQ3HE89k" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-7xyQ3HE89k/cynet-incident-response.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-7xyQ3HE89k/cynet-incident-response.html","updated_at":"2020-05-12T23:09:05+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-7xyQ3HE89k/cynet-incident-response.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase Databases","description":"More than 4,000 Android apps that use Google's cloud-hosted Firebase databases are 'unknowingly' leaking sensitive information on their users, including their email addresses, usernames, passwords, phone numbers, full names, chat messages and location data.\n\nThe investigation, led by Bob Diachenko from Security Discovery in partnership with Comparitech, is the result of an analysis of 15,735<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/85GPqtqnfQA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/85GPqtqnfQA/android-firebase-database-security.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/85GPqtqnfQA/android-firebase-database-security.html","updated_at":"2020-05-12T10:37:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/85GPqtqnfQA/android-firebase-database-security.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"An Undisclosed Critical Vulnerability Affect vBulletin Forums — Patch Now","description":"If you are running an online discussion forum based on vBulletin software, make sure it has been updated to install a newly issued security patch that fixes a critical vulnerability.\n\nMaintainers of the vBulletin project recently announced an important patch update but didn't reveal any information on the underlying security vulnerability, identified as CVE-2020-12720.\n\nWritten in PHP<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/kjOBI7D1RKc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/kjOBI7D1RKc/vBulletin-access-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/kjOBI7D1RKc/vBulletin-access-vulnerability.html","updated_at":"2020-05-11T19:11:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/kjOBI7D1RKc/vBulletin-access-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"7 New Flaws Affect All Thunderbolt-equipped Computers Sold in the Last 9 Years","description":"A cybersecurity researcher today uncovers a set of 7 new unpatchable hardware vulnerabilities that affect all desktops and laptops sold in the past 9 years with Thunderbolt, or Thunderbolt-compatible USB-C ports.\n\nCollectively dubbed 'ThunderSpy,' the vulnerabilities can be exploited in 9 realistic evil-maid attack scenarios, primarily to steal data or read/write all of the system memory of a<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-c-zVB8x_pY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-c-zVB8x_pY/thunderbolt-vulnerabilities.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-c-zVB8x_pY/thunderbolt-vulnerabilities.html","updated_at":"2020-05-11T16:28:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-c-zVB8x_pY/thunderbolt-vulnerabilities.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"DigitalOcean Data Leak Incident Exposed Some of Its Customers Data","description":"DigitalOcean, one of the biggest modern web hosting platforms, recently hit with a concerning data leak incident that exposed some of its customers' data to unknown and unauthorized third parties.\n\nThough the hosting company has not yet publicly released a statement, it did has started warning affected customers of the scope of the breach via an email.\n\nAccording to the breach notification<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/QnwmsUOEI8o" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/QnwmsUOEI8o/digitalocean-data-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/QnwmsUOEI8o/digitalocean-data-breach.html","updated_at":"2020-05-08T22:03:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/QnwmsUOEI8o/digitalocean-data-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"This Asia-Pacific Cyber Espionage Campaign Went Undetected for 5 Years","description":"An advanced group of Chinese hackers has recently been spotted to be behind a sustained cyber espionage campaign targeting government entities in Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar, and Brunei—which went undetected for at least five years and is still an ongoing threat.\n\nThe group, named 'Naikon APT,' once known as one of the most active APTs in Asia until 2015,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/3mdfxlhuBic" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/3mdfxlhuBic/asia-pacific-cyber-espionage.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3mdfxlhuBic/asia-pacific-cyber-espionage.html","updated_at":"2020-05-07T09:59:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3mdfxlhuBic/asia-pacific-cyber-espionage.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Facebook Launches 'Discover,' A Secure Proxy to Browse the Internet for Free","description":"More than six years after Facebook launched its ambitious Free Basics program to bring the Internet to the masses, the social network is back at it again with a new zero-rating initiative called Discover.\n\nThe service, available as a mobile web and Android app, allows users to browse the Internet using free daily data caps.\n\nFacebook Discover is currently being tested in Peru in partnership<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/98AXQuwFndE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/98AXQuwFndE/facebook-discover-free-internet.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/98AXQuwFndE/facebook-discover-free-internet.html","updated_at":"2020-05-06T13:19:38+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/98AXQuwFndE/facebook-discover-free-internet.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Breach LineageOS, Ghost, DigiCert Servers Using SaltStack Vulnerability","description":"Days after cybersecurity researchers sounded the alarm over two critical vulnerabilities in the SaltStack configuration framework, a hacking campaign has already begun exploiting the flaws to breach servers of LineageOS, Ghost, and DigiCert.\n\nTracked as CVE-2020-11651 and CVE-2020-11652, the disclosed flaws could allow an adversary to execute arbitrary code on remote servers deployed in data<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/BCdT47YgINk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/BCdT47YgINk/saltstack-rce-exploit.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BCdT47YgINk/saltstack-rce-exploit.html","updated_at":"2020-05-06T08:18:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BCdT47YgINk/saltstack-rce-exploit.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Download: 'Coronavirus Cyber Security for Management' Template for CISOs","description":"The Coronavirus crisis introduces critical operational challenges to business continuity, placing high stress on organizations' management.\n\nAs a result, CIOs and CISOs face a double challenge on the cyber risk front – apart from the new risks that the mass transfer of employees working remotely brings, capturing the management mindshare for further investments in security becomes harder than<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/lFu0YfV0RWY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/lFu0YfV0RWY/coronavirus-cybersecurity-management.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/lFu0YfV0RWY/coronavirus-cybersecurity-management.html","updated_at":"2020-05-05T16:57:29+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/lFu0YfV0RWY/coronavirus-cybersecurity-management.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Warning: Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets","description":"Since the past few weeks, software giant Citrix has privately been rolling out a critical software update to its enterprise customers that patches multiple security vulnerabilities affecting Citrix ShareFile content collaboration platform.\n\nThe security advisory—about which The Hacker News learned from Dimitri van de Giessen, an ethical hacker and system engineer—is scheduled to be available<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/HDQcKEZu3TQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/HDQcKEZu3TQ/citrix-sharefile-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/HDQcKEZu3TQ/citrix-sharefile-vulnerability.html","updated_at":"2020-05-05T16:14:59+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/HDQcKEZu3TQ/citrix-sharefile-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Change This Browser Setting to Stop Xiaomi from Spying On Your Incognito Activities","description":"If you own a Xiaomi smartphone or have installed the Mi browser app on any of your other brand Android device, you should enable a newly introduced privacy setting immediately to prevent the company from spying on your online activities.\n\nThe smartphone maker has begun rolling out an update to its Mi Browser/Mi Browser Pro (v12.1.4) and Mint Browser (v3.4.3) after concerns were raised over its<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/EiAcW2H7kbI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/EiAcW2H7kbI/xiaomi-browser-history.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/EiAcW2H7kbI/xiaomi-browser-history.html","updated_at":"2020-05-05T14:44:35+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/EiAcW2H7kbI/xiaomi-browser-history.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers","description":"Cybersecurity researcher Mordechai Guri from Israel's Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices.\n\nDubbed 'POWER-SUPPLaY,' the latest research builds on a series of<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/rxbVwJaSMNE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/rxbVwJaSMNE/air-gap-malware-power-speaker.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rxbVwJaSMNE/air-gap-malware-power-speaker.html","updated_at":"2020-05-04T14:57:58+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rxbVwJaSMNE/air-gap-malware-power-speaker.html","link_host":"thehackernews.com","from":"thehackernews"}]