Cyber News - Page 31

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Exploit for Unpatched Vulnerability in Chrome, Opera, Edge Released

Indian security researcher Rajvardhan Agarwal recently published a proof-of-concept code for a brand new vulnerability affecting Google Chrome, Microsoft Edge, Brave, and Opera (all Chromium-based). The vulnerability resides in the V8 JavaScript engine, and it’s most likely the same flaw,…

CYBER NEWS
Stuxnet All Over Again-What Happened at Iran's Natanz Enrichment Facility

Stuxnet All Over Again? What Happened at Iran’s Natanz Enrichment Facility?

Remember Stuxnet? Described as “the first digital weapon,” the devastating computer worm caused substantial damage to Iran’s nuclear program. Natanz Incident: What Happened? According to an announcement made on Sunday, Iran shared that an accident impacted the electricity distribution network…

CYBER NEWS
facebook-data-leak-sensorstechforum

Facebook Facing an Investigation by EU Regulators Following Data Leak

Several days ago, we reported a large-scale data leak that affected 533 million Facebook accounts. The vulnerability that caused the data leak is now fixed. However, the social media platform is facing an investigation by EU regulators. The data breach…

CYBER NEWS
New Wormable Android Malware-sensorstechforum

New Wormable Android Malware Spreading via WhatsApp Messages

How safe is Google Play Store? We have written about numerous cases of malicious Android apps hiding in various app stores, directly threatening the owners of the devices. This time security researchers have discovered a wormable piece of Android malware…

CYBER NEWS
vulnerability-danger-sensorstechforum

Dangerous Vulnerabilities in SAP Mission-Critical Applications, Patch Now

Hackers are currently exploiting several security vulnerabilities in popular mission-critical SAP applications. The vulnerabilities enable full takeover and give access to the targeted vulnerable organizations. Several Critical Vulnerabilities in SAP Applications According to the official CISA announcement of the attacks,…

CYBER NEWS

Nearly Half of US Employees Continue to Keep Their Passwords on Sticky Notes

What is the safest way to keep your passwords? Perhaps using a password manager is considered one of the better ways to manage your passwords, especially in a working environment. Unfortunately, despite the available technologies, new Keeper Security study shows…

CYBER NEWS
linkedin phishing in 2021

Hackers Lure LinkedIn Users with Fake Job Offers in a New Phishing Attack

A new spear phishing campaign leveraging LinkedIn users is using fake job offers to lure potential victims. The payload of the malicious operation is the more_eggs backdoor controlled by the Golden Chicken hackers. According to eSentire security researchers, the phishing…

CYBER NEWS
Massive Data Leak Exposes 533 Million Facebook Users from 106 countries-sensorstechforum

Massive Data Leak Exposes 533 Million Facebook Users from 106 countries

Have you changed your Facebook password lately? If you haven’t, you may want to change it – security researchers reported a massive data breach exposing the phone numbers and personal details of millions of users. The exposed data consists of…

CYBER NEWS

CVE-2020-2509 and CVE-2021-36195 in QNAP Nas Devices

Security researchers reported vulnerabilities in several legacy models of QNAP network attached storage devices. These devices are prone to remote unauthenticated attacks due to two zero-day flaws – CVE-2020-2509 and CVE-2021-36195. According to SAM’s security research team, QNAP TS-231’s latest…

CYBER NEWS
user privacy

Google and Apple Collect Telemetry Data Even When Users Opt Out

Is your online privacy respected by large tech companies? Not so much! Both Google’s Pixel and Apple’s iPhone are siphoning mobile device data without the users’ consent. According to researcher Douglas Leith from Trinity College, both iOS and Android transmit…

CYBER NEWS
Cybercriminals Pose as Cybersecurity Researchers to Target... Cybersecurity Researchers

Cybercriminals Pose as Cybersecurity Researchers to Target… Cybersecurity Researchers

Cybercriminals constantly reinvent themselves and their hacking approaches. One of the latest “innovations” in the world of cyber scamming focuses on cybercrooks targeting cybersecurity researchers. Cybercrooks posing as cybersecurity researchers… targeting cybersecurity researchers “In January, the Threat Analysis Group documented…

CYBER NEWS

PHP Git Server Hit in a Cyberattack

The official PHP Git server was recently compromised in a software supply chain attack. The attackers pushed unauthorized updates to implant a backdoor in the server’s source code. PHP Git Server Cyberattack: What Should You Know? “Yesterday (2021-03-28) two malicious…

CYBER NEWS
CVE-2020-11261 qualcomm  android

CVE-2020-11261: Qualcomm Zero-Day Used in Attacks against Android Devices

CVE-2020-11261 is a new dangerous vulnerability in Android devices. The vulnerability affects Qualcomm chipsets and their Graphics component in an issue called “improper input validation.” CVE-2020-11261: Some Details If exploited successfully, the flaw could cause memory corruption when a malicious…

CYBER NEWS
iOS Developers Targeted by XcodeSpy, Trojanized Xcode Project

iOS Developers Targeted by XcodeSpy, Trojanized Xcode Project

Security researchers are warning of a new malware piece specifically targeting iOS developers. Known as XcodeSpy, the malware is a trojanized version of a legitimate app. XcodeSpy: Trojanized Xcode Project Targeting iOS Developers Sentinel Labs researchers recently became aware of…

CYBER NEWS
new mirai botnet

New Mirai Botnet Emerges, Attacking Vulnerable IoT Devices

New security reports indicate the emergence of new Mirai botnets exploiting specific vulnerabilities to target IoT devices. The attacks are ongoing, trying to download a malicious shell script with further infection outcomes, such as the execution of Mirai variants and…

CYBER NEWS
update sign

Apple to Change Its Security Update Policy for iPhone and iPad

Are you a proud owner of an iPhone or iPad? You should know that it is highly likely for Apple to change how it delivers security updates to these devices. Specific code detected in iOS 14.5 indicates that Apple is…

CYBER NEWS
The CVE-2017-11882 Exploit Still Used by Hackers, Years After It Was Patched

The CVE-2017-11882 Exploit Still Used by Hackers, Years After It Was Patched

New analysis indicates that a well-known security vulnerability in Microsoft Office is still exploited by threat groups. The vulnerability in question is CVE-2017-11882, a memory corruption flaw in Microsoft Office Equation Editor, first discovered in December 2017. The exploit allows…

CYBER NEWS
CVE-2021-21193 google chrome

CVE-2021-21193 Zero-Day in Chrome, Update to Version 89.0.4389.90

If you haven’t recently checked what version of Google Chrome you are using, you should definitely check. Google recently addressed another actively exploited zero-day vulnerability in its browser, CVE-2021-21193. This is the second time Google releases such an update within…

CYBER NEWS
iphone automatic call recorder bug

Bug in iPhone Automatic Call Recorder App Could Listen to Your Conversations

It seems that there’s a wave of iOS and macOS vulnerabilities being uncovered by security researchers. The latest one concerns Automatic Call Recorder, an iOS call recording application which contained a bug that could give access to users’ conversations. The…

CYBER NEWS

CVE-2021-1844 in iOS, macOS Could Cause Arbitrary Code Execution

A new vulnerability affecting iOS, macOS, watchOS, and Safari browser was recently detected by security researchers. Apple has already released a fix for the bug, CVE-2021-1844. CVE-2021-1844 in iOS, macOS, watchOS The vulnerability was discovered by two researchers: Clément Lecigne…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree