Cyber News - Page 49

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

On-Premise vs Cloud-to-Cloud Backup: the Best Solution for Your SaaS

Software-as-a-service has become a commonplace practice for businesses globally over the last few years, with a reported 78% increase of SaaS spending in just the one year between 2017 and 2018. Despite this clear growth in cloud computing, leading businesses…

CYBER NEWS

Emotet Christmas Phishing Attacks Launched Via Fake Party Menus

Emotet hackers are rapidly sending out phishing email messages with the intention of scamming the recipients into believing that they are receiving Christmas party menus. In the messages there are attached files that will lead to malware infections. Various types…

CYBER NEWS

“Gangnam Industrial Style” Attack Against Enterprise Networks Carried Out By Hackers

The “Gangnam Industrial Style” is a well-planned attack against high-profile enterprise networks, most of them located in South Korea. The reports indicate that an experienced hacking group is leveraging the intrusion attempts against industrial, engineering and manufacturing companies, as well…

CYBER NEWS

Why Remote Desktop Is Not As Safe As You Think

Remote Desktop poses an interesting dichotomy to businesses. On one hand, it provides a simple way to maximize office efficiency. It can boost profit margins and save money with a simple investment in the right technology. It can boost employee…

CYBER NEWS

Momentum Botnet Infects Large Number of Linux and IoT Devices

The Momentum botnet is one of the most attack entities online at the moment. This is a large network of contaminated Linux and IoT hosts that can be used for large-scale sabotage campaigns. An unknown hacking group is behind its…

CYBER NEWS

Juice Jacking Malware Charging Attacks May Lead To Serious Infections

Juice jacking is the practice of abusing publicly available USB charging ports to insert malware onto the introduced smart devices. It appears that this malicious technique can allow the hackers to deliver a wide range of dangerous malware. The end…

CYBER NEWS

Magecart Hackers Breach Fake Brand E-Commerce Sites

The infamous Magecart hacking group has been fund to be behind a large-scale attack against e-commerce sites. They have been found to replace JavaScript code into numerous sites that list counterfeit big brands products. Examples include the likes of Nike,…

CYBER NEWS

Plundervolt Attack (CVE-2019-11157) Affects Intel SGX

Researchers from three European universities discovered a new type of attack that affects Intel CPUs, or more specifically, the data located in Intel SGX (Intel Software Guard Extensions). Intel SGX is considered a highly-secured area but researchers were able to…

CYBER NEWS

NGINX Office Raided By Russian Police: Co-Founders Have Been Detained

The office of one of the world’s most popular web servers NGINX located in Moscow has been raided by Russian Police. Several media report indicate that the authorities have also detained several of the employees, including two of the co-founders…

CYBER NEWS
cryptocurrency miner image

Process Hollowing Technique Used to Install Cryptocurrency Miners

A team of security researchers reported the discovery of a new technique used to install cryptocurrency miners without raising awareness that’s called Process Hollowing. This is done by using a sophisticated dropper capable of delivering the intended malware. The main…

CYBER NEWS

Microsoft Security Essentials Lifecycle Coming to an End in January

Microsoft has been pushing Windows 10 purposefully since 2015. Part of this strategy is the end of life of Windows 7 which is set on January 14th, 2020. Microsoft Security Essentials Lifecycle Coming to an End Apparently, the company doesn’t…

CYBER NEWS

460,000 Payment Card Records for Sale on Joker’s Stash

The trade with stolen credit and debit card details is proliferating. A brand-new research indicates that more than 460,000 payment (both debit and credit) card records were offered for sale on the popular underground forum Joker’s Stash. The information was…

CYBER NEWS

Google Patches Severe Gmail “DOM Clobbering” Security Bug

Google has patched a dangerous vulnerability in Gmail which is related to an instance in which web browsers execute rich code, also known as “DOM Clobbering”. The bug was reported to the company in August 2019 by a security expert.…

CYBER NEWS

Cybersecurity Guide: How To Do A Secure Digital Transformation

Achieving success as a small business owner is a lot harder than most people realize. Modern consumers have more options than ever before regarding the companies they can use. If you want to put your company ahead of the competition,…

CYBER NEWS

Ongoing Hybrid Phishing Attacks Can Bypass Security Solutions

Phishing strategies are among the most widely used strategies used to scam and manipulate the intended user into falling victim to viruses and various crimes. However most of the phishing strategies can be easily detected and bypassed. At this time…

CYBER NEWS

Evil Corp Hackers that stole $100 Million Indicted by US DoJ

Over the years there have been constant attacks with various malware, one of the main culprits appears to be a Russian hacking group called Evil Corp. The are reported to have hijacked more than $100 million in various campaigns focusing…

CYBER NEWS

Is Your Business in Need of Pen Testing?

With cybersecurity threats increasing daily, the need to regularly identify and address vulnerabilities to protect against the latest threats is now more critical than ever. Penetration testing, a popular type of ethical hacking assessment, is a crucial way to help…

CYBER NEWS

New Lazarus macOS Trojan Is Using Fileless Techniques

A new macOS Trojan has been uncovered, which, researchers believe, was developed by the Lazarus hacking group. The malware has been analyzed by Patrick Wardle. However, it was discovered by another security researcher, Dinesh Devadoss, who shared his findings in…

CYBER NEWS

PyXie RAT Can Steal Passwords, Record Video and Get You Ransomware

A new Python RAT (Remote Access Trojan) was just uncovered by security researchers. Called PyXie, the Trojan has been observed in the wild since 2018, or maybe even earlier, but hasn’t been analyzed deeply until now. Pyxie RAT: Technical Overview…

CYBER NEWS

Millions of Private SMS Messages Exposed in TrueDialog Data Breach

Another huge data breach was discovered by researchers Noam Rotem and Ran Locar from vpnMentor. The team came across an unprotected TrueDialog database hosted by Microsoft Azure, which contained tens of millions of SMS messages. TrueDialog Data Breach: Users in…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree