Cyber News - Page 49

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Ransomware a Greater Risk for Businesses Still Running Windows 7

Windows 7 users are perhaps aware that official support for the operating system will end on January 14th, 2020. This event would put anyone who still hasn’t switched to Windows 10 to a greater risk of ransomware and malware attacks,…

CYBER NEWS

Bronze President Hackers Behind Massive Cyber Espionage Campaign

A security research group has uncovered a dangerous hacking group known as Bronze President. Apparently the criminals are responsible for an extensive cyber espionage campaign targeting networks located in Asia. They are using a combination of custom code and publicly…

CYBER NEWS

Brazilian Coybot Android Trojan Continues With Attacks

The CoyBot Android Trojan which is a well-known threat in Brazil continues with its attacks against end users The first campaigns were first detected in October 2018 and since then other campaigns have been occasionally reappeared. The latest activity has…

CYBER NEWS

HappyHotel.jp Data Breach Affects Tons of Highly Sensitive Information

Have you ever used a search engine called HappyHotel? There is one reason to use this particular search engine, and it is finding a “love hotel” in Japan. If you’ve used HappyHotel’s services, you should know that it has suffered…

CYBER NEWS

Which Information Are Cybercriminals After and What Do They Do with It?

As a society, we’ve never been so interconnected before. The internet provides a useful tool for communication and has made our lives easier in many respects. Now you practically run all your affairs online – from banking to running a…

CYBER NEWS

Spelevo Exploit Kit Used To Distribute Malware Via Fake Adult Sites

The Spelevo Exploit Kit as one of the dangerous weapons handled by hackers has been found to create numerous adult sites and infect them with malware automatically. The hackers will distribute the threats via organized phishing strategies. A distinctive feature…

CYBER NEWS
HTTP Injector image

Smominru Botnet Launches Miner-Infected Taylor Swift Images

The Smominru botnet which is a well-known weapon used by criminal organizations has been revealed to conduct a massive campaign with the aim of infecting the victims with cryptocurrency miners. The payload files which carry the infections are JPEG images…

CYBER NEWS

On-Premise vs Cloud-to-Cloud Backup: the Best Solution for Your SaaS

Software-as-a-service has become a commonplace practice for businesses globally over the last few years, with a reported 78% increase of SaaS spending in just the one year between 2017 and 2018. Despite this clear growth in cloud computing, leading businesses…

CYBER NEWS

Emotet Christmas Phishing Attacks Launched Via Fake Party Menus

Emotet hackers are rapidly sending out phishing email messages with the intention of scamming the recipients into believing that they are receiving Christmas party menus. In the messages there are attached files that will lead to malware infections. Various types…

CYBER NEWS

“Gangnam Industrial Style” Attack Against Enterprise Networks Carried Out By Hackers

The “Gangnam Industrial Style” is a well-planned attack against high-profile enterprise networks, most of them located in South Korea. The reports indicate that an experienced hacking group is leveraging the intrusion attempts against industrial, engineering and manufacturing companies, as well…

CYBER NEWS

Why Remote Desktop Is Not As Safe As You Think

Remote Desktop poses an interesting dichotomy to businesses. On one hand, it provides a simple way to maximize office efficiency. It can boost profit margins and save money with a simple investment in the right technology. It can boost employee…

CYBER NEWS

Momentum Botnet Infects Large Number of Linux and IoT Devices

The Momentum botnet is one of the most attack entities online at the moment. This is a large network of contaminated Linux and IoT hosts that can be used for large-scale sabotage campaigns. An unknown hacking group is behind its…

CYBER NEWS

Juice Jacking Malware Charging Attacks May Lead To Serious Infections

Juice jacking is the practice of abusing publicly available USB charging ports to insert malware onto the introduced smart devices. It appears that this malicious technique can allow the hackers to deliver a wide range of dangerous malware. The end…

CYBER NEWS

Magecart Hackers Breach Fake Brand E-Commerce Sites

The infamous Magecart hacking group has been fund to be behind a large-scale attack against e-commerce sites. They have been found to replace JavaScript code into numerous sites that list counterfeit big brands products. Examples include the likes of Nike,…

CYBER NEWS

Plundervolt Attack (CVE-2019-11157) Affects Intel SGX

Researchers from three European universities discovered a new type of attack that affects Intel CPUs, or more specifically, the data located in Intel SGX (Intel Software Guard Extensions). Intel SGX is considered a highly-secured area but researchers were able to…

CYBER NEWS

NGINX Office Raided By Russian Police: Co-Founders Have Been Detained

The office of one of the world’s most popular web servers NGINX located in Moscow has been raided by Russian Police. Several media report indicate that the authorities have also detained several of the employees, including two of the co-founders…

CYBER NEWS
cryptocurrency miner image

Process Hollowing Technique Used to Install Cryptocurrency Miners

A team of security researchers reported the discovery of a new technique used to install cryptocurrency miners without raising awareness that’s called Process Hollowing. This is done by using a sophisticated dropper capable of delivering the intended malware. The main…

CYBER NEWS

Microsoft Security Essentials Lifecycle Coming to an End in January

Microsoft has been pushing Windows 10 purposefully since 2015. Part of this strategy is the end of life of Windows 7 which is set on January 14th, 2020. Microsoft Security Essentials Lifecycle Coming to an End Apparently, the company doesn’t…

CYBER NEWS

460,000 Payment Card Records for Sale on Joker’s Stash

The trade with stolen credit and debit card details is proliferating. A brand-new research indicates that more than 460,000 payment (both debit and credit) card records were offered for sale on the popular underground forum Joker’s Stash. The information was…

CYBER NEWS

Google Patches Severe Gmail “DOM Clobbering” Security Bug

Google has patched a dangerous vulnerability in Gmail which is related to an instance in which web browsers execute rich code, also known as “DOM Clobbering”. The bug was reported to the company in August 2019 by a security expert.…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree