Cyber News - Page 52

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

What Does the CCPA Actually Mean for Users’ Data Privacy?

California — keeping with its tradition as a groundbreaker in privacy-related legislation in the US — has passed the strictest data privacy law in the nation, the California Consumer Privacy Act (CCPA), which will be enforceable January 1, 2020, onward.…

CYBER NEWS

CVE-2019-17093: Vulnerability in Avast and AVG Antivirus

CVE-2019-17093 is a vulnerability discovered in all editions of Avast and AVG Antivirus programs. The issue could allow an attacker to load malicious DLL files to bypass protection and achieve persistence on compromised systems. It should be noted that exploiting…

CYBER NEWS

17 iOS Apps Infected with Trojan Clicker Lurked in Apple App Store

17 infected apps were discovered in the Apple App Store. The apps contained a Trojan clicker type of malware, which communicated with a known command-and-control server to simulate user interactions. Clicker malware is usually deployed for ad fraud, and so…

CYBER NEWS
HTTP Injector image

Cache Poisoned Denial of Service (CPDoS) Attacks Used Against Content Delivery Networks

Security researchers uncovered a dangerous new hacking mechanisms which allows criminals to launch devastating attacks against content delivery networks. The new attack type is known as CPDoS which stands for “Cache-Poisoned Denial-of-Service “, this is categorized is a type of…

CYBER NEWS

Several High Severity Bugs Fixed in Firefox and Chrome

A bunch of critical security vulnerabilities affect Mozilla Firefox browser. Another high-severity flaw was also discovered in Google Chrome. It appears that all bugs could lead to arbitrary code execution. According to an advisory by MS-ISAC (Multi-State Information Sharing and…

CYBER NEWS

After Effects: The Real Cost of a Cyber Attack

When we think of cybercrimes against businesses, it can be easy only to consider the immediate effect: the data that is stolen by hackers during the breach. However, there is actually far more to think about. Here we take a…

CYBER NEWS

Winnti Hackers Attack Microsoft SQL Servers Via Skip-2.0 Malware

The Skip-2.0 malware is a dangerous threat which is being launched by a hacking group known as Winnti. These hackers are referred to as a mega-collective as several smaller hacking groups use this name to identify themselves. The criminals are…

CYBER NEWS

CVE-2017-11882: Agent Tesla Malware Leverages Phishing Techniques

The Agent Tesla malware is among the most popular tools used by hackers in order to launch global phishing campaigns. The analysis shows that the CVE-2017-11882 vulnerability is being used in combination with malware documents in order to lead to…

CYBER NEWS

CVE-2019-17666: Severe Linux Vulnerability in the rtlwifi Driver

A new serious Wi-Fi vulnerability has been reported by security researchers, this time in Linux. The vulnerability which resides in the rtlwifi driver that mainly supports the Realtek Wi-Fi chips model used in Linux devices, could allow attackers compromise a…

CYBER NEWS

Phorpiex Botnet Is In Control of A Global Sextortion Campaign

A security report indicates that a new malware is being launched against victims worldwide, this time this is the Phorpiex botnet. The criminals use a sextortion social engineering scam that manipulates the recipients into thinking that they need to pay…

CYBER NEWS

Amazon Echo and Kindle Devices Vulnerable to KRACK Flaws

Remember the KRACK vulnerabilities? The vulnerabilities were uncovered in 2017 when a team of experts engineered a dangerous exploit called the Krack Attack which makes it possible for malicious users to eavesdrop on Wi-Fi traffic between computers and other network…

CYBER NEWS

The Graboid Cryptojacking Worm Is Exploiting Unsecured Docker Hosts

A new type of cryptojacking (cryptomining) worm has been detected in the wild. This cryptojacking worm is using vulnerable Docker hosts to spread, which is something rarely seen in malware attacks. Dubbed Graboid, the worm has spread to more than…

CYBER NEWS

Someone Hacked the Largest Underground Market for Stolen Credit Cards

The following story can be described as a “hack the hackers” type of story. Apparently, one of the largest underground stores for purchasing stolen credit card data has been hacked itself. As a result, more than 26 million credit and…

CYBER NEWS

Ransomware Attack Hits Pitney Bowes in Time of IRS Tax Fillings

Pitney Bowes, a mailing equipment and services company based in Stamford, Connecticut, has been hit by ransomware. The company says that no customer data has been compromised in the attack. According to the official statement, the company experienced an “outage”…

CYBER NEWS

WordPress Versions Prior to WordPress 5.2.4 Vulnerable, Patch Now!

Security researchers reported the discovery of six serious vulnerabilities in WordPress. The vulnerabilities’ impact has been rated as “high”, meaning that patching as soon as possible is highly advisable. Six WordPress Vulnerabilities Fixed in WordPress 5.2.4 According to Symantec’s security…

CYBER NEWS

CVE-2019-14287: Sudo Bug Allows Restricted Users to Run Commands as Root

CVE-2019-14287 is a new vulnerability discovered in Sudo. Sudo is considered one of the most important and widely used programs for Unix- and Linux-based operating systems that allows a permitted user to execute a command as the superuser or another…

CYBER NEWS

Apple Is Sharing Safe Browsing Data with Chinese Conglomerate Tencent

According to a brand new research, Apple is sharing some browsing history with China. More specifically, the company is sending some browsing history of iOS 13 Safari users to Tencent Holdings Limited, a Chinese multinational conglomerate. Tencent specializes in various…

CYBER NEWS

Americans Lack Digital Knowledge, Widely Unaware of What HTTPS Is

How educated are Americans on the various cybersecurity topics? The conclusion is, not enough. According to the results of a new Pew Research Center survey, 55% of Americans couldn’t identify what 2FA is. What is worse, just 30% of surveyed…

CYBER NEWS

iTunes and iCloud Exploited By Hackers and Infected With Ransomware

An unknown hacking group has been found to exploit Apple’s iTunes and iCloud programs in order to deploy ransomware. This is possible by using a zero-day vulnerability which allows the criminals to implant the malicious code without alerting any installed…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree