Cyber News - Page 55

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

3 Weirdest Recent Online Scams and How to Avoid Them

Phishing, ransomware, emails from a Nigerian prince – all these scams are quite well-known. It’s true that some Internet users still trust them, but the majority do not. However, scammers are not easily defeated. Daily, they create new ways of…

CYBER NEWS

Lyceum Hackers Conduct Targeted Attacks Against The Middle East

The Lyceum hackers are a criminal group that was found to be be coordinating attacks against high-profile targets in the Middle East. The activities of the group were under investigation by security experts and released to the public. From the…

CYBER NEWS
Retadup worm

Retadup Worm Responsible for STOP Ransomware Infections Is Being Shut Down

The Retadup worm is being shut down by computer specialists, this is the malware which is responsible for the large part of the STOP ransomware versions. The worm is primarily spread in Latin America and it has an extensive malware…

CYBER NEWS

Key Questions to Ask a Pen Test Provider Before Commissioning Them

Penetration testing has become an essential for businesses looking to maintain a robust cybersecurity posture. But if you are commissioning a test for the first time, then you have the challenge of choosing the right provider. Pen testing is a…

CYBER NEWS

CamScanner Android App Silently Installs Necro Trojan

It appears that one of the most popular Android apps called CamScanner is installing silently the Necro Trojan on victim devices, according to a new security report. It is very possible that the developers have not done it intentionally as…

CYBER NEWS

Windows Users Be Warned, ‘Complete Hack’ Flaw Used in Attacks!

A team of security experts discovered a ‘Complete Control’ weakness in the Windows operating system which can cause a wide variety of dangerous actions. The problem lies within vulnerable that is exploited by the device drivers and operating system allowing…

CYBER NEWS

WS-Discovery Protocol Exposes 630,000 Devices to DDoS Attacks

The Web Services Dynamic Discovery (WS-Discovery) protocol could be exploited to launch large-scale DDoS attacks, security researchers are reporting. What is the WS-Discovery protocol? The WS-Discovery protocol is described as a technical specification that defines a multicast discovery protocol to…

CYBER NEWS

CVE-2019-14378: QEMU Vulnerability Allows Virtual Machine Escape

CVE-2019-14378 is a new vulnerability in QEMU, an open-source hardware virtualization package. QEMU emulates a machine’s processor through dynamic binary translation and provides a set of different hardware and device models for the machine, enabling it to run a variety…

CYBER NEWS
iot-related-risks-business-sector-companies

IoT-Related Risks in the Business Sector (for Companies)

The Internet of Things home security systems can protect all IoT devices from attack. Businesses protect devices such as phones and computers with antiviruses, while the Internet of Things offers protection to appliances like fridges, cars, monitoring devices, and much…

CYBER NEWS

Bolik Trojan Spreads To Intended Targets Via Fake VPN Sites

The Balik Trojan as a dangerous malware threat is being spread onto fake hacker-made sites, in the case of the ongoing attacks they are fake VPN sites. According to the available security reports this is done by using a sophisticated…

CYBER NEWS

VPN Services Attacked By CVE-2019-11510 Vulnerability

The CVE-2019-11510 vulnerability is being used against VPN providers worldwide. The available security reports indicate that a criminal collective is actively seeking to break the security barriers of several providers of VPN services. This is done by exploiting a recent…

CYBER NEWS

Silence Hackers Launch Attacks on Financial Organizations Worldwide

The Silence hackers are a dangerous criminal collective that are confirmed to be Russian-speaking and probably originate from a Slavic country. Their latest attacks are set against numerous financial organizations and institutions across a wide range of areas. The frequency…

CYBER NEWS
Baldr malware

Baldr Malware Set Against CS:GO and Apex Legends Cheaters

The Baldr Malware is a computer virus which is designed against computer gamers who cheat at two popular games — Counter Strike: Global Offensive and Apex Legends. It is particularly powerful and the hacking group behind it appears to be…

CYBER NEWS

Luscious.net Data Breach Exposed Unencrypted Users’ Data

Luscious.net, an adult website, has suffered a data breach which has led to the leak of over a million users’ personal information. Leaky, Unprotected Database Exposed Millions of Luscious.net Users vpnMentor researchers were the first to report about an exposed…

CYBER NEWS
everything-you-should-know-ssl-2019

Here’s Everything You Should Know About SSL in 2019

Do you wonder what an SSL certificate is? And why is it crucial to have one? Well, this is the most common question asked by the users when setting up domains. Security is one of the key elements with regards…

CYBER NEWS

CVE-2019-15107: Remote Code Execution Vulnerability in Webmin

Webmin, a web-based application for system administrators of Unix-based systems (Linux, FreeBSD, or OpenBSD servers), contains a backdoor that could allow remote attackers to execute malicious commands with root privileges. A compromised system can later be used to navigate further…

CYBER NEWS

Adwind RAT Spam Campaigns Hit the Utilities Sector

The well-known Adwind RAT (Remote Access Trojan) has been deployed in new malicious campaigns against targets in the utility industry. The attacks are carried out via spam email messages that redirect potential victims to the malicious payload. Adwind RAT Enables…

CYBER NEWS

Phishing Campaign Uses Fake Microsoft Login 404 Error Pages

Phishing campaigns are constantly evolving and employing rather unusual methods to tricks users. One such campaign was just unveiled by Microsoft researchers who came across phishing campaigns that utilize custom 404 error pages in an effort to make the users…

CYBER NEWS

Terrifying Statistics: 1 in 5 Americans Victim of Ransomware

A brand new survey highlights the persistent threat that ransomware continues to be in 2019. According to data gathered by Anomali and The Harris Poll, ransomware attacks 1 in 5 Americans. The survey was based on responses from more than…

CYBER NEWS
Cerberus Android Trojan

Cerberus Android Trojan Is The Newest Mobile Malware For Rent

The Cerberus Android Trojan is a new malware made for the popular mobile operating system. It is a complex threat which is being offered for rent to prospective hackers via a model which is similar to RaaS. When equipped it…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree