Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 121

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Lax Cybersecurity Practices in the CIA Caused the Vault 7 Leaks

Remember the WikiLeaks scandal from 2017? An internal CIA report recently revealed what caused the massive data breach of confidential information to happen. It was the agency’s own inability to secure its systems, which led to the WikiLeaks leak of…

CYBER NEWS

Lamphone Attack Takes Eavesdropping to Another Level

Lamphone is a new side-channel attack that can be used to eavesdrop sound. The attack has been discovered by researchers Ben Nassi, Yaron Pirutin, Adi Shamir, and Yuval Elovici from Ben-Gurion University of the Negev and Weizmann Institute of Science.…

CYBER NEWS

Vulnerabilities in GTP Protocol Impact 5G Networks in Various Attacks

A new report showcases serious vulnerabilities the modern GTP communication protocol deployed by mobile network operators. It is crucial to note that the GTP protocol is used to transmit user and control traffic on 2G, 3G, and 4G networks. This…

CYBER NEWS

Persistent Vulnerability in Facebook Messenger App for Windows

A vulnerability in the Facebook Messenger application for Windows was just discovered by Reason Labs security researchers. The vulnerability is present in Messenger version 460.16, and it could allow attackers to exploit the app to execute malicious files already present…

CYBER NEWS

Thanos RaaS Now Includes the RIPlace Ransomware Bypass

The RIPlace ransomware bypass technique, discovered by security researchers in November 2019, has now been implemented by the Thanos ransomware family. This is the first case of RIPlace being utilized by ransomware. The technique relies on just a few lines…

CYBER NEWS

CVE-2020-13777: Vulnerability in GnuTLS Hiding for 2 Years

CVE-2020-13777 is a vulnerability in GnuTLS, a widely adopted, open source library that implements Transport Layer Security. The vulnerability has been present in the library for nearly two years, making resumed TLS 1.3 sessions vulnerable to attack. The vulnerability, introduced…

CYBER NEWS

June 2020 Patch Tuesday: Biggest Update in the History of Microsoft

June 2020 Patch Tuesday is Microsoft’s biggest so far, containing fixes for 129 vulnerabilities. On the positive side, despite being the largest Patch Tuesday in the history of the company, it doesn’t include fixes for zero-day bugs, meaning that none…

CYBER NEWS

KingMiner Is Back in New Attacks against MSSQL Servers

A new security report indicates that the KingMiner crypto-mining operation is back in the game with new attacks against MSSQL (Microsoft SQL) databases. Owners of such databases should secure their servers, as Sophos researchers detected brute-force attacks attempting to guess…

CYBER NEWS

CVE-2020-12695: Severe CallStranger Bug in Most IoT Devices

A severe vulnerability, known under the CVE-2020-12695, has been discovered in a core protocol in nearly all IoT devices – the Universal Plug and Play (UPnP) protocol. The flaw, dubbed CallStranger could allow attackers to take over IoT devices in…

THREAT REMOVAL
Trojan Horse guide

Trojan Horse Viruses – All You Need to Know [Removal & Protection Guide]

Trojan horse malware has been around for decades, becoming more sophisticated and persistent and targeting both home users and enterprises with the same success rate. This article will educate you on everything you need to know about the Trojan Horse,…

CYBER NEWS

CVE-2020-12405, 7 Other Serious Bugs Patched in Firefox 77

Have you updated your Firefox browser? Mozilla just released security updates addressing eight vulnerabilities, five of which rated as high-risk. To be protected against the attacks, users should be running Firefox 77. If you haven’t restarted your Firefox browser in…

CYBER NEWS

CVE-2020-12753: Bug in LG Smartphones from the Past 7 Years

A new vulnerability in LG smartphones, CVE-2020-12753, was recently discovering, affecting models from the past seven years. A security update has been issued that addresses the vulnerability which impacts the bootloader component in LG smartphones. This component is separate from…

CYBER NEWS
class-action-google

Class Action against Google for Tracking Private Browsing

Google is the subject of a class action, and the accusations are regarding the invasion of the privacy of millions of users. The complaint, filed to the District Court of Northern California claims that Google is tracking users’ browsing and…

CYBER NEWS

Here’s Why British People Should Be Aware with 0300 013 5000 Calls

A warning was issued recently regarding phone calls from the so-called contact tracers. The phone calls supposedly alert people about having been in close proximity with potential carriers of COVID-19. In danger are particularly British people, TheRegister reported. Why British…

CYBER NEWS

The State of Malvertising and Drive-By Downloads

A new Confiant report explores “the details behind a recent spree of website hacks” as well as the malicious payloads delivered to victims. The report also includes details on drive-by downloads, their current state in major browsers, and how they…

CYBER NEWS

Daniel’s Dark Web Hosting Hack Leads to Permanent Shutdown

The largest free web hosting provider for dark web services has been hacked. Daniel’s Hosting was hacked in March this year, and its database was subsequently leaked online. Apparently, a hacker known as KingNull not only breached the portal and…

CYBER NEWS

Sign in with Apple Zero-Day Bug Could Have Critical Impact

In April, security researcher Bhavuk Jain discovered a zero-day vulnerability in Sign in with Apple that affected third-party applications using the feature without implementing their own security measures. According to the researcher, the Apple zero-day “could have resulted in a…

THREAT REMOVAL
Norton-Security-Warning-Popup

Norton Security Warning Pop-up Removal (PC Is Infected)

What Is Norton Security Warning Pop-up? ‘Norton Security Warning’ pop-up windows suggesting that the user should call the number 1-855-770-9879 are an indication of adware and PUP infiltration. Users should not trust anything displayed by “Norton Security Warning” since the…

CYBER NEWS

Ransomware Getting Greedier and Bigger, Attacks Increase by 40%

Ransomware continues to be a top cybersecurity threat to both individual users and public and private organizations. Ransomware has proven to be the most insidious and persistent threat plaguing users and enterprises worldwide for money. Now, the latest statistics reveal…

CYBER NEWS

Highly Critical StrandHogg 2.0 Bug Affects 1 Billion Android Devices

A new highly dangerous, critical vulnerability was identified in the Android operating system. The vulnerability resembles the StrandHogg flaw, revealed last year, but is even more sophisticated. Dubbed StrandHogg 2.0 and also known as CVE-2020-0096, the vulnerability affects all Android…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree