Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 140

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

CYBER NEWS

NetCAT Attack: Intel Server-Grade CPUs Exploited to Leak Sensitive Data

Cybersecurity researchers have outlined a new type of attack involving Intel server-grade processors since 2012. The attack is based on a vulnerability named NetCAT (Network Cache Attack). The vulnerability could allow sniffing data by mounting a side-channel attack over the…

CYBER NEWS

Period-Tracking Apps Are Sharing Your Sex Life with Facebook

How much exactly does Facebook know about us? No one would argue the pervasiveness of the social network and its impact on our lives. But do we fully comprehend the amounts of personal, highly sensitive information that Facebook gets hold…

CYBER NEWS

Patch Gap in Chrome Could Have Been Weaponized by Attackers

Patch gapping is a serious issue that puts a system at risk of exploits. The problem stems from a gap in time before a patch of a security vulnerability in an open-source software is shipped to users. The vulnerability may…

CYBER NEWS

1 Million Imperial & Dabman IoT Radio Devices Vulnerable to Attacks

Dangerous vulnerabilities were recently discovered in Telestar Digital GmbH IoT radio devices. The flaws could allow remote attackers to hijack vulnerable systems. The vulnerabilities were discovered by Vulnerability Laboratory. Some of them are already assigned CVE numbers – CVE-2019-13473 and…

CYBER NEWS

Wikipedia Suffers a Major DDoS Attack

Wikipedia has suffered a major DDoS attack. The attack took place during the weekend. According to Wikipedia’s official statement released on September 7, “Wikipedia was hit with a malicious attack that has taken it offline in several countries for intermittent…

CYBER NEWS

CVE-2019-13224, Other Critical Flaws in PHP – Patch Now

The latest versions of PHP were recently released (PHP version 7.3.9, 7.2.22 and 7.1.32 across several branches) to address several highly critical vulnerabilities in its core and bundled libraries. The most dangerous of these vulnerabilities are the ones that could…

THREAT REMOVAL

Remove Search.searcherzip.com – Browser Hijacker Instructions

What is Search.searcherzip.com and how dangerous is it to your browser and system? Let’s find out in this article. Shortly said, Search.searcherzip.com is classified as a browser hijacker and hoax search engine. A browser hijacker changes the homepage and search…

CYBER NEWS

Researchers Disclose Unpatched Android Zero-Day

A new zero-day vulnerability has been discovered in Android. If exploited, the flaw could give a local attacker escalated privileges on the compromised device. According to TrendMicro’s Zero Day Initiative researchers Lance Jiang and Moony Li, the flaw is located…

CYBER NEWS

Zerodium Payout for Android Exploits Jumps to $2.5M, iOS Price Drops

Zerodium, a “leading exploit acquisition platform for premium zero-days and advanced cybersecurity research”, has updated its price list. Apparently, Android exploits are now more expensive than iOS exploits, for the first time in history. Zerodium is now paying much more…

THREAT REMOVAL

Remove Search.formshubtab.com – Browser Hijacker Instructions

What is Search.formshubtab.com? Shortly said, Search.formshubtab.com is classified as a browser hijacker. A browser hijacker changes the homepage and search engine of the affected browser, and in this case they will be set to https://search.formshubtab.com and https://query.formshubtab.com. This article reveals…

CYBER NEWS

Supermicro BMCs Expose Corporate Networks to Remote Attacks

Myriad vulnerabilities were discovered in the so-called baseboard management controllers (BMCs) of Supermicro servers. The flaws could be exploited in remote attacks and could grant access to corporate networks. Eclypsium researchers dubbed the vulnerabilities USBAnywhere. Image: Eclypsium USBAnywhere Vulnerabilities Explained…

CYBER NEWS

School Year 2019: Malware Hiding in Essays and Textbooks

Malware authors are always finding ways to be up-to-date with current events in their distribution campaigns. According to a brand new research by Kaspersky Lab, the latest wave of malware is hiding in school- and student-related content posted for free…

CYBER NEWS

Hackers Use iOS Exploit Chains Against iPhone Users

Several privilege escalation exploit chains were discovered in iOS devices by Google’s Threat Analysis Group (TAG) and Project Zero teams. The vulnerabilities were actively used by threat actors who also used compromised websites to carry out watering hole attacks against…

THREAT REMOVAL

Remove Toresonetalet.pro Redirect and Stop Push Notifications

What is Toresonetalet.pro? What to do if your browser is affected by Toresonetalet.pro and its redirects, push notifications and ads? Let’s find out in this article. Toresonetalet.pro is considered a suspicious URL address that was created with the sole purpose…

THREAT REMOVAL

Xml.seavibes.club Redirect – How-to-Remove Instructions

What is Xml.seavibes.club (seavibes.club)? What to do if your browser is affected by Xml.seavibes.club and its redirects and ads? Let’s find out in this article. Xml.seavibes.club (seavibes.club) is a highly suspicious URL address that was created with the sole purpose…

THREAT REMOVAL

Remove 3442516480@qq.com Virus (File) – Ransomware Instructions

Update September 2019. What is 3442516480@qq.com ransomware? Let’s find out in this article. According to our research, the so-called is 3442516480@qq.com ransomware, also known as is 3442516480@qq.com virus or is 3442516480@qq.com file virus, is an iteration of the well-known Dharma…

CYBER NEWS

WS-Discovery Protocol Exposes 630,000 Devices to DDoS Attacks

The Web Services Dynamic Discovery (WS-Discovery) protocol could be exploited to launch large-scale DDoS attacks, security researchers are reporting. What is the WS-Discovery protocol? The WS-Discovery protocol is described as a technical specification that defines a multicast discovery protocol to…

CYBER NEWS

CVE-2019-14378: QEMU Vulnerability Allows Virtual Machine Escape

CVE-2019-14378 is a new vulnerability in QEMU, an open-source hardware virtualization package. QEMU emulates a machine’s processor through dynamic binary translation and provides a set of different hardware and device models for the machine, enabling it to run a variety…

THREAT REMOVAL

Remove Hese Virus (.hese File) – Ransomware Instructions

Update September 2019. What is virus? This article presents a step-by-step guide on how to remove Hese ransomware virus and how to attempt to recover .hese encrypted files. virus is a ransomware infection that is based on the code of…

THREAT REMOVAL

Remove MessengerNow PUP – Removal Instructions

What is MessengerNow and is it a useful application, or a PUP? Let’s find out in this article. MessengerNow is classified as a potentially unwanted program (PUP) and adware which generates pop-up ads unrelated to your browsing. The MessengerNow PUP…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree