Cyber News - Page 44

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Covid-19 Phishing Campaign Delivers QnodeService Node.Js Trojan

Covid-19 phishing campaigns are on the rise as criminals are taking advantage of the virus pandemic outbreak. The newest payload which is a Node.js Trojan which is otherwise known as QnodeService. According to the available information the detection rate is…

CYBER NEWS

North Korean Malware Strikes Again: 3 New Advanced Tools Discovered

A joint advisory released by USA agencies reveals three new North Korean malware called COPPERHEDGE, TAINTEDSCRIBE, and PEBBLEDASH. The reports are published online at the US CERT site and include not only a description but also a malware analysis of…

CYBER NEWS

iOS Security Worse Than Ever Due to Oversupply of Bugs

What is the current state of iOS security? According to exploit acquisition firm Zerodium, iOS security is not doing that great anymore. Five years ago, Zerodium was offering a reward of $1 million for a browser-based, untethered jailbreak in iOS…

CYBER NEWS

The 10 Most Exploited Vulnerabilities, According to the U.S. Governmen

The Cybersecurity and Infrastructure Security Agency (CISA), together with the Federal Bureau of Investigation (FBI), and the broader U.S. Government have released an alert detailing the 10 most exploited vulnerabilities in the period between 2016 and 2019, and also so…

CYBER NEWS

Astaroth Trojan Uses YouTube Channels to Hide Command and Control Servers

Remember the Astaroth Trojan? Considered to be one of the stealthiest pieces of info-stealing malware, Astaroth continues to evolve in its latest attacks. According to a new report released by Cisco Talos, the malware has obtained two major updates. This…

CYBER NEWS

Intel and Microsoft Join Forces Against Malware With New STAMINA Technology

Intel and Microsoft are working together to create new methods to protect from various new malware, their newest project is the creation of the STAMINA technology. This is a smart AI powered mechanism that allows a system to detect viruses.…

CYBER NEWS

400 Million Malware Infections Were Detected in April 2020

A new cybersecurity analysis indicates that the number of malware infections has increased significantly for the last month. According to data compiled by researchers at AtlasVPN and Kaspersky’s real-time cyberthreat map, there have been more than 10 million malware infections…

CYBER NEWS

Thunderspy Attack Used To Hack Thunderbolt Ports: Millions of PCs Affected

A dangerous Thunderbolt bug has been discovered by a criminal collective and exploited in the recent Thunderspy attack. It is reported to affect both Windows and Linux computers manufactured before 2019. The results of a successful Thunderbolt hack can result…

CYBER NEWS

Prevent Network Faults: Helpful Network Management Tips for Any Business

Did you know that many network faults are preventable? They may also be able to be fixed quickly just by using basic network “hygiene” steps. Some of the most serious issues are usually the result of a few smaller issues…

CYBER NEWS

Nearly 4M Users of MobiFriends Dating App Exposed in Data Breach

MobiFriends dating app has exposed the personal information of 3,688,060 users. MobiFriends’ user details were posted online and are currently available for download on multiple destinations. The security breach which caused the compromise of users’ personal details occurred in January…

CYBER NEWS

CVE-2020-7473: Citrix ShareFile Vulnerable, Corporate Data at Risk

Several security vulnerabilities in Citrix ShareFile content collaboration platform have been discovered. CVE-2020-7473, CVE-2020-8982, CVE-2020-8983 Identified as CVE-2020-7473, CVE-2020-8982, and CVE-2020-8983, the vulnerabilities could allow an unauthenticated attacker to compromise the storage zones controller, enabling the attacker to access ShareFile…

CYBER NEWS

New Kaiji IoT Botnet Targets Linux Servers, Performs DDoS Attacks

A new strain of IoT malware, dubbed Kaiji, was just discovered by security researchers MalwareMustDie and Intezer Labs. The new IoT malware is built to target Linux-based servers and connected devices to launch DDoS attacks, and was coded by Chinese…

CYBER NEWS

CAM4 Data Breach: 7 Terabytes of Highly Sensitive User Data Exposed

CAM4, an adult live streaming website, has been through a data breach which exposed over 7TB of personally identifiable information of its members. The incident was discovered Security Detectives and Anurag Sen. The PII was stored on more than 10.88…

CYBER NEWS

There’s a Zero-Day Vulnerability in Windows 10 May 2020 Update

The release of Windows 10 May 2020 Update has been pushed to the end of the month, most likely due to a zero-day vulnerability. However, security experts are worried that even when if flaw is patched in a timely manner,…

CYBER NEWS

EventBot: the Next Big Android Malware to Steal Your Financial Data

Just like any other form of malware, Android malware is also evolving, thus becoming more versatile in the damage it does. The latest strain of such malware is strictly after financial data while in the meantime conducting spy operations. The…

CYBER NEWS

The Ultimate Guide to Backup & Storage Through the Ages [Timeline]

The Coronavirus has completely reshaped the way we use the Internet. Remote work is on the rise, and historically, we’re processing more data than we have ever before. With this, hackers have fallen into great company. As we await defeating…

CYBER NEWS

Custom Asnarok Trojan Targets Firewalls in Highly Destructive Attacks

A very experienced hacking group has been detected to break into networks and firewalls using a malware called the Asnarok Trojan, also known as Asnarök. This is a very recent coordinated attack marked as highly destructive. A lot of effort…

CYBER NEWS

Top 5 Unusual Examples of Hacker Attacks

Hacker attacks are becoming increasingly common across the world. In 2020, the cost of a data breach will far exceed $150 million. While most attacks employ the usual methods and affect the usual targets, like small businesses, other attackers have…

CYBER NEWS

Two iOS Zero-Day Vulnerabilities Exploited in the Wild for Years

Two remotely exploitable, iOS zero-day vulnerabilities affecting the Mail app on iPhones and iPads were just discovered. Fortunately, the bugs were patched in iOS 13.4.5 beta which was released last week. Unfortunately, it is highly likely that both bugs were…

CYBER NEWS

ADV200006: Microsoft Windows Can Be Hacked Via Crafted Fonts

Microsoft Windows has been the attack of computer criminals following the discovery of a bug in the system which allows specially crafted documents to be used to deliver malware to the victim systems. The issue is tracked in the ADV200006…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree