#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
DevSecOps

zombie warning | Breaking Cybersecurity News | The Hacker News

Category — zombie warning
U.S Emergency broadcast System vulnerable to hackers

U.S Emergency broadcast System vulnerable to hackers

Jul 09, 2013
A major vulnerability has been discovered in the U.S. Emergency Alert System , researchers have warned.that could allow hackers to break into the system and broadcast fake messages to the United States. According to a new report by security firm IOActive, U.S. Emergency Alert System, the system used to broadcast to the United States in times of national crisis can be hacked remotely by hackers. Recent firmware update of DASDEC-I and DASDEC-II application servers disseminated the secure shell (SSH) keys, that allows anyone with limited knowledge to log in at the root level of the server. Technically, compromising the DASDEC systems doesn't sound too difficult. In that scenario, an attacker could take over the system and issue emergency messages. Monroe Electronics was notified about vulnerabilities in its equipment in January and the company's internal development team developed a software update that was made available in March. The Emergency Alert S...
Hacker broadcasts zombie warning on TV

Hacker broadcasts zombie warning on TV

Feb 13, 2013
Television viewers in Montana, perhaps looking to stay inside from the scary cold outside, got an even scarier surprise when warnings of a zombie apocalypse took over their TV screens. There TV Stations Montana's KRTVMichigan's, WNMU-TV and WBUP-TV were victims of this zombie prank. The channels later said that somebody had hacked into its system. The message warned zombies were attacking the living and warned people not to approach or apprehend these bodies as they are extremely dangerous. Channel said on its website , " Someone apparently hacked into the Emergency Alert System and announced on KRTV and the CW that was an emergency in several Montana counties. The message did not originate from KRTV, and there is no emergency. Our engineers are investigating to determine what happened and if it affected other media outlets. " Officials with the stations in Michigan said law enforcement authorities determined the attack originated outside the U.S. The message was quickly...
What Is Attack Surface Management?

What Is Attack Surface Management?

Feb 03, 2025Attack Surface Management
Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what's exposed and where attackers are most likely to strike. With cloud adoption dramatically increasing the ease of exposing new systems and services to the internet, prioritizing threats and managing your attack surface from an attacker's perspective has never been more important. In this guide, we look at why attack surfaces are growing and how to monitor and manage them properly with  tools like Intruder . Let's dive in. What is your attack surface? First, it's important to understand what we mean when we talk about an attack surface. An attack surface is the sum of your digital assets that are 'reachable' by an attacker – whether they are secure or vulnerable, known or unknown, in active use or not. You can also have both internal and external attack surfaces - imagine for example a malicious email attachment landing in a colleague's inbox, vs a new FTP server being...
Expert Insights / Articles Videos
Cybersecurity Resources