Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 139

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

Bitcoin-Stealing Trojanized Apps Found on Download.com

Bitcoin is once again making the headlines, this time thanks to a piece of malware found on Download.com. The malware was stealing malware identified as through swapping user accounts with the accounts of the hackers behind the operation. This operation…

CYBER NEWS

CVE-2018-1050, CVE-2018-1057 Samba Flaws Endanger Servers

Two critical vulnerabilities (CVE-2018-1050, CVE-2018-1057) have been discovered in Samba, the open-source software that is a re-implementation of the SMB networking protocol. The Samba software can run on popular operating systems such as Windows, Linux, UNIX, IBM System 390, OpenVMS.…

CYBER NEWS

CVE-2018-0886 Critical Flaw Affects All Windows Versions

CVE-2018-0886 is the identifier of a critical flaw found in Credential Security Support Provider (CredSSP). The vulnerability affects all versions of Windows and allows malicious hackers remote access to exploit RDP (Remote Desktop Protocol) and WinRM (Windows Remote Management). Related…

CYBER NEWS

Necurs and Gamut Botnets Delivering 97% of All Spam to Your Inbox

Have you been wondering who is behind the enormous amount of spam you receive in your inbox? Security researchers at McAfee have the answer – two botnets are at fault for 97 percent of all spam emails sent out in…

CYBER NEWS

Highly Sophisticated Slingshot Malware Uses Routers to Infect

A highly sophisticated threat capable of cyber espionage via targeting routers has been uncovered by researchers at Kaspersky Lab. Dubbed Slingshot, the malware has been used in malicious campaigns on victims in the Middle East and Africa for several years.…

CYBER NEWS

CVE-2018-0141 Cisco Vulnerability Could Lead to Full System Control

CVE-2018-0141 has been identified as the latest vulnerability in Cisco’s Prime Collaboration Provisioning (PCP) software. Apparently, the software has a hardcoded password that could be leveraged by hackers aiming to obtain full control of the system. On top of this,…

CYBER NEWS

Mitigation against Memcached-Based DDoS Attacks Discovered

DDoS attacks based on Memcached servers can now be mitigated, researchers say. The mitigation method includes the victim sending a “flush_all” command back to the servers that initiated the attack. This method was suggested few days ago by one of…

CYBER NEWS

Windows Defender Halts Malware Campaign Trying to Infect 400,000 PCs

Windows Defender successfully halted a large malware campaign that tried to infect more than 400,000 users. The payload of the campaign was a cryptocurrency miner. The attempt took place on March 6, and it continued 12 hours, Microsoft recently revealed.…

CYBER NEWS

CVE-2018-6789 Exim Flaw Exposes 400,000 Email Servers

A flaw in a widely used email program that may be exposing some 400,000 servers globally has been discovered by security researchers. The vulnerability which has been identified as CVE-2018-6789 resides in all releases of the Exim message transfer agent…

CYBER NEWS

New Record: DDoS Attack at 1.7 Tbps Based on the Memcached Flaw

Just last week a record-breaking DDoS attack took place – registered at 1.3 Tbps. The target was GitHub, and the attack was based on a flaw in Memcached servers recently made public. It became evident that cybercriminals can exploit Memcached…

THREAT REMOVAL

.Bitconnect File Virus (Jigsaw Ransomware) – Remove and Restore

A new iteration of the well-known Jigsaw ransomware has been detected by security researchers, and it is known to append the .Bitconnect extension to encrypted files. As reported by researcher Michael Gillespie, the ransomware is using a new extortion method…

THREAT REMOVAL

.gif File Virus (GlobeImposter) – Remove and Restore Files

Security researchers have come across a new iteration of the infamous GlobeImposter ransomware. This latest iteration appends the .gif file extension to the encrypted files. Once the encryption process is over, the .gif ransomware (also referred to as .gif file…

CYBER NEWS

Fakeapp Android Malware Harvests Facebook Credentials

Because of its large user base, Facebook is often targeted by cybercriminals who use the platform to spread scams and deliver malware. The latest such campaign, dubbed Fakeapp, involves a new Android malware strain that is phishing for Facebook login…

CYBER NEWS

New Largest DDoS Attack at 1.3 Tbps Hits GitHub

The largest so far GGoS attack happened yesterday registered at 1.3 Tbps. The target was GitHub. The attack was based on a flaw in Memcached servers made public just a few days ago. Apparently, cybercriminals can exploit Memcached servers to…

CYBER NEWS

Some Phishing Emails Have a Nearly 100 Percent Click Rate

Phishing emails have been successfully fooling employers, tricking them into clicking on the provided links and thus initiating various malicious campaigns. To counter the success of phishing, many companies have started various employee trainings to help them recognize fraudulent attempts…

CYBER NEWS

Consumers Using Mobile Banking Apps at Greater Risk of Financial Loss

Mobile banking apps are a convenience but they also pose a risk to users. A new global research carried out by Avast shows that consumers using mobile banking apps are at a greater risk of falling victim to theft of…

CYBER NEWS

Coldroot macOS RAT and Keylogger Goes Undetected for Years

Coldroot is a remote access Trojan (RAT) that has been distributed on MacOS machines without being detected for quite some time. Researchers say that the malware is cross-platform and that it could successfully drop a keylogger on MacOS prior to…

CYBER NEWS

uTorrent Vulnerability Could Be Exploited by Any Website

One of the most popular BitTorrent apps – uTorrent – has been found to be vulnerable to easily exploited flaws that could allow hackers to perform a variety of malicious actions. More specifically, two versions of the app are vulnerable…

CYBER NEWS

Tesla’s Amazon Cloud Hacked in Cryptocurrency Mining Attack

A hack has happened at Tesla – the company’s cloud has been abused to mine cryptocurrency, as reported by RedLock researchers. The report is focused on cloud security. Related Story: How to Steal a Tesla Car, the Android App Edition…

CYBER NEWS

Microsoft Fails to Fix Edge Bug on Time – Google Makes It Public

Google has revealed details about a flaw in Microsoft Edge browser after Microsoft missed the deadline for fixing it. Google had previously notified Microsoft about the vulnerability in the browser via Project Zero, giving them the usual 90-day disclosure deadline.…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree