Cyber News - Page 107

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Phishing Sites Go HTTPS In Response to Chrome, Firefox New Feature

Netcraft researchers report that the number of phishing sites using HTTPS has increased since January when a new feature was introduced in Mozilla Firefox and Google Chrome browsers. Thanks to this feature, the two browsers display warnings when an HTTP…

CYBER NEWS

CVE-2017-8917 – Easily Exploitable Joomla SQL Flaw

CVE-2017-8917 is a Joomla vulnerability just disclosed by Sucuri researchers. During regular search audits, the researchers discovered an SQL injection flaw affecting Joomla! 3.7. The flaw is easily exploitable as it doesn’t require a privileged account on the target’s site.…

CYBER NEWS

Kaspersky on Reddit – A Secure Embedded OS Is Possible

Eugene Kaspersky, the CEO of Kaspersky Inc. has offered a very interesting AMA (Ask me Anyithing) on Reddit forums from which some interesting details about the future of the company and cyber-security were revealed. We were able even briefly to…

CYBER NEWS

Adylkuzz Uses WannaCry Exploits, Mines Monero Cryptocurrency

Security researchers at Proofpoint just revealed that there’s been another attack that used the same exploits deployed in the WannaCry global ransomware outbreak. More particularly, Proofpoint’s Kafeine researcher says that the EternalBlue exploit has been used together with a backdoor…

CYBER NEWS

The Shadow Brokers with New Exploit Leaks to Come

Malware researchers have detected that The Shadow Brokers, the group that released the “WannaCry Exploits”, have made a statement recently that more zero-day bugs are about to be released along with classified information. The hackers have not specified what exactly…

CYBER NEWS

WordPress Bug Bounty Program Interested in XSS, RCE, SQL Flaws

WordPress is one of the platforms that often fall victims to malicious attacks. Fortunately, the company has decided to join the bug bounty initiative, now embraced by multiple organizations in their attempt to confront cybercrime. Security researchers who come across…

CYBER NEWS

Irfan Shakeel: Unnecessary Network Connectivity Makes Critical Data Vulnerable

Irfan Shakeel is an engineer, penetration tester, a security researcher who has dedicated his career to securing information through quality education. Irfan is the founder of ehacking.net and the EH Academy where people interested in programming, penetration testing, wireless and…

CYBER NEWS

Top 5 WannaCry Ransomware Mitigations to Adopt Now

The WannaCry (.WNCRY, Wana Decrypt0r 2.0) ransomware outbreak is definitely the scariest cybersecurity event of 2017. So far. The ransomware has compromised the systems of Telefonica in Spain, as well as multiple hospitals in the UK. It has also been…

CYBER NEWS

Researchers Find Built-In Keylogger in HP Audio Driver

Are you the owner of an HP laptop? Then read carefully. Security researchers from security firm Modzero came across a built-in keylogger in an HP audio driver while examining Windows Active Domain infrastructure. “Security reviews of modern Windows Active Domain…

CYBER NEWS

CVE-2017-5891, CVE-2017-5892 Found in Asus RT Wireless Routers

ASUS RT wireless router owners, beware! If you haven’t updated your router’s firmware, you should do it immediately. Nightwatch Cybersecurity researchers have found vulnerabilities, CVE-2017-5891 and CVE-2017-5892, in these routers. The team has revealed the POC exploit code for the…

CYBER NEWS

Persirai IoT Malware Exploits CVE-2017-8224, Known Vulnerabilities

A researcher has found multiple vulnerabilities in Wireless IP Camera (P2P) WIFICAM cameras and also flaws in custom HTTP server. More specifically, more than 100,000 Internet-connected cameras are prone to attacks by a new IoT malware dubbed Persirai. The malware…

CYBER NEWS

KB4016871 May Cause Issues, DISM Still Not Working

Cumulative updates often cause headaches. Microsoft just rolled out May 2017’s Patch Tuesday, so let’s see how smooth things are going. The majority of users say that they experienced zero issues installing the cumulative updates. But there are still people…

CYBER NEWS

Severe CVE-2017-0290 in MsMpEng About to Be Patched

Just this morning, we wrote about the “worst Windows remote code exec in recent memory” discovered by Google Project Zero researchers Tavis Ormandy and Natalie Silvanovich. The terrifying bug is now made public and has been identified as CVE-2017-0290. The…

CYBER NEWS

This Is How You Are Falling Prey to Scams

Phishing scams started around the late 90’s, and have continuously evolved since. The latest forms of phishing include the traditional phishing, spear phishing, CEO frauds, and Business Email Compromise (BEC). One of the worst outcomes of phishing is the ransomware…

CYBER NEWS

Worst Windows Remote Code Execution Bug in Recent Memory Found

Researchers Tavis Ormandy and Natalie Silvanovish from Google Project Zero have discovered and reported a remote code execution vulnerability in Windows. This bug is in fact the “worst Windows remote code exec in recent memory”. The researchers also described the…

CYBER NEWS

Money Stolen via BEC Scams Funneled to Banks in China and Hong Kong

The Continuous Growth of BEC Scams Demonstrated in the Latest FBI Report BEC (Business Email Compromise) scams have grown to the staggering rate of 2,370 percent in the last couple of years, as reported by the FBI. The latest FBI…

CYBER NEWS

Hackers Exploit SS7 and mTANs to Drain Bank Accounts

Signaling System No. 7 known as SS7 has been exploited by hackers in attacks designed to steal money from victims’ online bank accounts. SS7 is a set of telephony signaling protocols developed in 1975, which is used to set up…

CYBER NEWS

Android Users, How Much Do You Know about Ultrasonic Tracking?

Have you heard of ultrasonic tracking? You may not be aware of it but it doesn’t mean you aren’t subjected to it. As discovered by researchers at Technische Universit at Braunschweig Brunswick, Germany, more and more Android applications are listening…

CYBER NEWS

DDoS Attacks Cost Organizations $250,000 per Hour

A new report by Neustar shows that DDoS attacks are quite expensive and cost organizations more than $2.5 million in revenue. Barret Lyon, Head of Research and Development at Neustar, called these attacks “the zeitgeist of today’s Internet”, and highlighted…

CYBER NEWS

Windows 10 S Will Have Microsoft Edge as Obligatory Default Browser

News broke out that Microsoft has made it so that their newer lighter version will have Edge set as a default browser permanently. However, it is possible to download an alternative web browser, so do not be hasty in your…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree