Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 134

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Encrypted GZipDe Malware Distributes Metasploit Backdoor

A new piece of, what appears to be, highly targeted malware has been discovered by researchers at AlienVault. The new malware strain, dubbed GzipDe and most likely used in cyber-espionage campaigns, uses an article about the next Shanghai Cooperation Organization…

CYBER NEWS

7 Vulnerabilities in 400 Axis Camera Models Unearthed (CVE-2018-10658)

Several critical vulnerabilities have been uncovered in some 400 Axis camera models. The flaws could allow hackers to take full control over the affected camera or entangle them in botnets. VDOO researchers unearthed the vulnerabilities that could be compromised via…

CYBER NEWS

CVE-2018-8235: Security Feature Bypass Bug in Edge, Patch Now!

An independent security researcher has uncovered by accident quite the unusual, high-severity browser vulnerability in Microsoft Edge, identified as CVE-2018-8235. Shortly put, the vulnerability would allow a malicious website to recapture content from other sites simply by playing audio files…

CYBER NEWS

Has Tether Been Used to Manipulate Bitcoin’s Value Boost?

According to two researchers from University of Texas, there is a particular reason that blew the price of Bitcoin out of proportion last year. Professor John Griffin and graduate student Amin Shams believe that Bitcoin’s value boost was due to…

CYBER NEWS

CVE-2018-3665 Vulnerability Found in Intel Core and Xeon Processors

Yet another chip vulnerability has been discovered, CVE-2018-3665, which has been called Floating Point Lazy State Save/Restore. The flaw resides in Intel Core and Xeon processors, and is similar to Spectre since it is a speculative execution flaw. Related Story:…

CYBER NEWS

Malicious Code Can Look Like It Has Been Signed by Apple

Security researchers just discovered a code-signing bypass vulnerability that allows malicious code to masquerade as an official Apply system file. In other words, some of the implementations of Apple’s official code-signing API can be exploited by hackers. Apple has made…

CYBER NEWS

Dixons Carphone Data Breach Exposes 5.9 Million Payment Cards

According to a statement made by the company, European electronics giant Dixons Carphone has suffered a serious data breach, or what it appears to be, two separate data breaches. Dixons Carphone Official Statement on the Data Breach As part of…

CYBER NEWS

$1.1 Billion in Cryptocurrency Theft Since December 2017

According to many experts in the cybersecurity field and to statistics as well, Bitcoin is no longer be the most preferable cryptocurrency used by cybercriminals in their operations. Bitcoin’s high profile and lack of complete anonymity has made cybercriminals turn…

CYBER NEWS

Three Vulnerabilities Found in Foscam IP Cameras (CVE-2018-6830)

Three vulnerabilities have been found in Foscam security cameras. Owners of such cameras are urged to update as soon as possible. The flaws are described as an arbitrary file-deletion bug, a shell command-injection bug and a stack-based buffer oferflow vulnerability.…

CYBER NEWS

.men, .gdn, .work – the Most Abused Top-Level Domains in 2018

Security researcher Brian Krebs has revealed some interesting details in terms of some of the riskiest domains on the Internet. Apparently, websites ending with some of the latest TLDs (top-level domains) such as .men, .work and .click are considered highly…

CYBER NEWS

250,000 Euros Fine for French Company that Exposed Customer Data

A fine in the size of 250,000 euro has been imposed on Optical Center, a French company specialized in selling eye and hearing aids. Apparently, the company has failed to secure the data of its customers on its website, and…

CYBER NEWS

Microsoft Ends Support for Windows 7, 8.1 in Community Forums

Are you still resisting Windows 10 and running Windows 7 or Windows 8? If that is your case, you should note that, starting July without providing a specific date, Microsoft is planning to no longer participate in the technical support…

CYBER NEWS

InvisiMole Spyware: Sophisticated Tool for Targeted Cyber Espionage

A previously unknown piece of complex malware with spying capabilities was recently discovered by researchers at cybersecurity firm ESET. The spyware is dubbed InvisiMole and is regarded as an advanced cyber espionage tool most likely designed for attacks on nation-state…

CYBER NEWS

Facebook Privacy Bug May Have Affected 14 Million Users

Yet another bug has been just found in Facebook automatically suggesting posting publicly when users were creating their posts. Related Story: Facebook Scraped SMS and Calls Data on Android Devices Facebook Bug Affects 14 Million Users, Problem Now Fixed According…

CYBER NEWS

Online Fraud Report 2018: Fraudsters Move From Reddit to Blockchain

RSA has released its Fraud Attack Trends report for Q1 of 2018. The report reveals that newsjacking has become fraudsters’ favorite way of empowering phishing attacks, among other things. A recent news that fraudsters leveraged to incite a major phishing…

CYBER NEWS

Ticketfly Data Breach: 26,151,608 Customer Emails Exposed

Online ticketing service Ticketfly has been targeted by a malicious actor and as a result, users’ personal information was stolen. In addition to that, Ticketfly’s website was defaced, and a message was dropped on the compromised homepage which said “Your…

CYBER NEWS

Telegram for Malicious Activities: How Hackers Exploit the App

There have been multiple cases of hackers leveraging Facebook Messenger and WhatsApp, and now Telegram is becoming a preferred target for hackers as evident by the increasing number of abuse cases on the service. Taking advantage of tools and services…

CYBER NEWS

MyHeritage DNA Service Exposes 92 Million Account Details

There are data breaches and then there are data breaches. Depending on the personal or sensitive information that is being leaked, data breaches can be true privacy nightmares. Related Story: Microsoft Builds a DNA Computer, Says Cancer Is a Computational…

CYBER NEWS

CVE-2018-8174 Vulnerability Used by Rig Exploit Kit

Security researchers have been following the activity surrounding the infamous Rig exploit kit. In these campaigns, attackers are compromising websites to inject a malicious script that redirects potential victims to the EK’s landing page. This attack scenario slightly changed in…

CYBER NEWS

U.S. Federal Agencies Lack Basic Cybersecurity Processes

A new report titled “Federal Cybersecurity Risk Determination Report and Action Plan” has shed some light on the cybersecurity inadequacy of U.S. federal agencies. Please note that: The Office of Management and Budget (OMB) is publishing this Federal Cybersecurity Risk…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree