Cyber News - Page 52

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Winnti Hackers Attack Microsoft SQL Servers Via Skip-2.0 Malware

The Skip-2.0 malware is a dangerous threat which is being launched by a hacking group known as Winnti. These hackers are referred to as a mega-collective as several smaller hacking groups use this name to identify themselves. The criminals are…

CYBER NEWS

CVE-2017-11882: Agent Tesla Malware Leverages Phishing Techniques

The Agent Tesla malware is among the most popular tools used by hackers in order to launch global phishing campaigns. The analysis shows that the CVE-2017-11882 vulnerability is being used in combination with malware documents in order to lead to…

CYBER NEWS

CVE-2019-17666: Severe Linux Vulnerability in the rtlwifi Driver

A new serious Wi-Fi vulnerability has been reported by security researchers, this time in Linux. The vulnerability which resides in the rtlwifi driver that mainly supports the Realtek Wi-Fi chips model used in Linux devices, could allow attackers compromise a…

CYBER NEWS

Phorpiex Botnet Is In Control of A Global Sextortion Campaign

A security report indicates that a new malware is being launched against victims worldwide, this time this is the Phorpiex botnet. The criminals use a sextortion social engineering scam that manipulates the recipients into thinking that they need to pay…

CYBER NEWS

Amazon Echo and Kindle Devices Vulnerable to KRACK Flaws

Remember the KRACK vulnerabilities? The vulnerabilities were uncovered in 2017 when a team of experts engineered a dangerous exploit called the Krack Attack which makes it possible for malicious users to eavesdrop on Wi-Fi traffic between computers and other network…

CYBER NEWS

The Graboid Cryptojacking Worm Is Exploiting Unsecured Docker Hosts

A new type of cryptojacking (cryptomining) worm has been detected in the wild. This cryptojacking worm is using vulnerable Docker hosts to spread, which is something rarely seen in malware attacks. Dubbed Graboid, the worm has spread to more than…

CYBER NEWS

Someone Hacked the Largest Underground Market for Stolen Credit Cards

The following story can be described as a “hack the hackers” type of story. Apparently, one of the largest underground stores for purchasing stolen credit card data has been hacked itself. As a result, more than 26 million credit and…

CYBER NEWS

Ransomware Attack Hits Pitney Bowes in Time of IRS Tax Fillings

Pitney Bowes, a mailing equipment and services company based in Stamford, Connecticut, has been hit by ransomware. The company says that no customer data has been compromised in the attack. According to the official statement, the company experienced an “outage”…

CYBER NEWS

WordPress Versions Prior to WordPress 5.2.4 Vulnerable, Patch Now!

Security researchers reported the discovery of six serious vulnerabilities in WordPress. The vulnerabilities’ impact has been rated as “high”, meaning that patching as soon as possible is highly advisable. Six WordPress Vulnerabilities Fixed in WordPress 5.2.4 According to Symantec’s security…

CYBER NEWS

CVE-2019-14287: Sudo Bug Allows Restricted Users to Run Commands as Root

CVE-2019-14287 is a new vulnerability discovered in Sudo. Sudo is considered one of the most important and widely used programs for Unix- and Linux-based operating systems that allows a permitted user to execute a command as the superuser or another…

CYBER NEWS

Apple Is Sharing Safe Browsing Data with Chinese Conglomerate Tencent

According to a brand new research, Apple is sharing some browsing history with China. More specifically, the company is sending some browsing history of iOS 13 Safari users to Tencent Holdings Limited, a Chinese multinational conglomerate. Tencent specializes in various…

CYBER NEWS

Americans Lack Digital Knowledge, Widely Unaware of What HTTPS Is

How educated are Americans on the various cybersecurity topics? The conclusion is, not enough. According to the results of a new Pew Research Center survey, 55% of Americans couldn’t identify what 2FA is. What is worse, just 30% of surveyed…

CYBER NEWS

iTunes and iCloud Exploited By Hackers and Infected With Ransomware

An unknown hacking group has been found to exploit Apple’s iTunes and iCloud programs in order to deploy ransomware. This is possible by using a zero-day vulnerability which allows the criminals to implant the malicious code without alerting any installed…

CYBER NEWS

CVE 2019-1166, CVE-2019-1338 Allow Full Domain Compromise

CVE 2019-1166 and CVE-2019-1338 are two vulnerabilities in Microsoft’s NTLM authentication protocol which were discovered by Preempt researchers. Fortunately, both flaws were patched by Microsoft in October 2019 Patch Tuesday. Attackers could exploit the flaws to achieve full domain compromise.…

CYBER NEWS

CVE-2019-9535: 7-Year-Old Bug in iTerm2 macOS App

iTerm2, a well-known open-source terminal emulator macOS app, has been found vulnerable to e critical flaw, which is known as CVE-2019-9535. The flaw was discovered during an audit sponsored by Mozilla, the company behind the Firefox browser. As for the…

CYBER NEWS

SVE-2019-15435 Critical Bug: 40 Million Samsung Users at Risk

SVE-2019-15435 is one of 21 vulnerabilities in Samsung devices which affect Galaxy S8, S9, S10, S10e, S10 Plus, S10 5G, Note 9, Note 10 and Note 10 Plus users. SVE-2019-15435 in particular is a critical issue, which is described as…

CYBER NEWS

Phishing Alert: 1 in 4 Malicious URLs Are Found on Trusted Domains

Webroot has released a new threat report which sums up what has been happening in the malware sector so far in 2019. The report is described as a “mid-year update to the annual Webroot Threat Report” and it showcases data…

CYBER NEWS
malware attacks image

Mustang Panda Chinese Hackers Launch Large-Scale Attacks Via Malware Documents

A dangerous new hacking collective known as Mustang Panda is leveraging macro-infected documents to target users worldwide. The large-scale campaign appears to be against both public and private sectors. At the moment there is no information available about the intentions…

CYBER NEWS

Outdated VPN Software Used For Spying on International Targets

Hacking groups have been found to use outdated VPN software and specific exploits found in them to spy on the victims. This is according to several reports from government security agencies. This is particularly dangerous as the criminal collectives can…

CYBER NEWS

LiLocked Ransomware Currently Encrypting Thousands of Servers

LiLocked ransomware, also known as LiLu, is once again active in campaigns, this time affecting thousands of web servers. This is a new strain of the LiLocked ransomware which we wrote about in July this year. LiLocked Ransomware Currently Targeting…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree