Cyber News - Page 58

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
national-security-strategy-best-practices

The Importance of a National Security Strategy: Best Practices

The physical protection of key assets in cyberspace collectively improves overall security for the entire public and private network infrastructure and is crucial to a national security strategy. Private and government organizations are required to use the guidelines and best…

CYBER NEWS

macOS Catalina: New Security and Privacy Features

Apple recently revealed its new operating system – macOS Catalina – during the annual Worldwide Developers Conference. Since we usually focus on the cybersecurity side of things, let’s see what the latest OS update brings in terms of privacy and…

CYBER NEWS

OSX/Linker Malware Leverages Known Gatekeeper Vulnerability

New Mac malware is being developed targeting a recently discovered macOS Gatekeeper security flaw. The malware in question is known as OSX/Linker, and it has been analyzed by Intego security researcher Joshua Long. OSX/Linker Malware: what we know so far…

CYBER NEWS

Presidential Alerts Can Be Spoofed Due to LTE (4G) Vulnerabilities

Have you heard of the Wireless Emergency Alert system? The WEA system is designed to broadcast alert messages by the president to the US population in case of a nationwide emergency. The system can also broadcast the so-called weather AMBER…

CYBER NEWS

Weird Security Incident: WeTransfer Sending Files to the Wrong Person

How do you feel about a file sharing service sending your files to the wrong person? Sounds frustrating, doesn’t it? WeTransfer Security Incident: What Happened? In fact, this is not a hypothetical situation. Apparently, the popular WeTransfer service has been…

CYBER NEWS
Malware Master134 Ad Campaign

Malware Master134 Ad Campaign Set Against Users Worldwide

Several security researchers pointed out that there is a large-scale malware Master134 Ad Campaign that is being directed against users worldwide. There is no information available about the perpetrators of the crime, it may be a highly experienced hacking group…

CYBER NEWS

Social Engineered Forum Data Breach Compromises 55,000 Members

Social Engineered, a platform which promotes “the art of human hacking” has been hacked. As a result, its users’ data was leaked on a competitor’s website. 89,000 unique email addresses linked to 55,000 members of the platform were compromised, as…

CYBER NEWS

Slackor RAT Allows Hackers to Use Slack Servers

The Slackor RAT is a tool developed primarily for security researchers allowing for malicious actors to use Slack as a server backend. In real-world scenarios it can also be utilized by hackers in large-scale attacks. This can be extremely dangerous…

CYBER NEWS

Malicious Bash Script Downloads Cryptominer on Linux Hosts

Sucuri researchers just reported that someone got in touch with them regarding “a malicious process they had discovered running on their web server”. The process in question was quite heavy on the CPU, pointing to a cryptominer process running in…

CYBER NEWS

How to Use Linux on a Windows Computer (Tutorial)

Linux. On Windows. It sounds like something straight out of a Skyrim mod where you can add Dark Souls in it but just like what Todd Howard said, “It just works.” No seriously, you can run Linux or Bash on…

CYBER NEWS

Ryuk Ransomware Updated with IP Address Blacklisting

We haven’t heard any news about Ryuk ransomware for some time but it seems its operators are back on track as the ransomware has been updated. The new variant is adding an IP address and computer blacklisting to skip the…

CYBER NEWS
cryptocurrency-travel-sensorstechforum

Crypto Coin Mining and What Are the Risks (Updated)

A new lucrative method for generating profits in digital currencies has been created and used for a while now. It is known as Digital Currency Mining, and everyone can participate in it. However, this type of profit generating via using…

CYBER NEWS

Youtube Queue Chrome Extension Hijacked Users’ Search Queries

A Chrome extension was just removed from the browser’s official Web Store because it was covertly hijacking search engine queries and taking users to suspicious search results. The extension in question is Youtube Queue, and it has been installed by…

CYBER NEWS

CVE-2019-11707: Critical Bug in Firefox Needs Immediate Patching

Did you notice your Firefox browser prompting you to update it? It’s because Mozilla just released an emergency patch addressing CVE-2019-11707, an actively exploited critical security vulnerability. This means that your Firefox browser needs to be patched immediately so that…

CYBER NEWS

Here’s How Easy It Is to Hack and Exploit a Smart Coffee Maker

Avast researchers hacked a smart coffee maker “in all kinds of ways”. They even turned it into a ransomware tool and a gateway to a home network. The idea of this hacking project was to see how deep IoT vulnerabilities…

CYBER NEWS

CVE-2019-7406 in TP-Link Wi-Fi Extenders Can Be Exploited without Authentication

IBM researchers just discovered another serious zero-day vulnerability, this time impacting TP-Link Wi-Fi Extenders. The vulnerability (known as to CVE-2019-7406) could lead to remote code execution attacks and affects TP-Link Wi-Fi Extender models RE365, RE650, RE350 and RE500 running firmware…

CYBER NEWS

CVE-2019-11477: Linux Flaw Discovered by Netflix Researcher

A number of Linux and FreeBSD servers and systems are vulnerable to a denial of service vulnerability dubbed SACK Panic, as well as other forms of attacks. Four security vulnerabilities affecting a range of Linux and FreeBSD servers were unearthed…

CYBER NEWS

Phishing Attacks Are Spreading WSH RAT, Houdini’s New Version

The dangerous Houdini worm has been transformed into a new variant dubbed WSH Remote Access Tool (RAT). More specifically, the new malware is an iteration of the VBS-based Houdini also known as H-Worm, which first appeared back in 2013. The…

CYBER NEWS

Android.FakeApp.174 Trojan Tricks You with Push Notifications

Security researchers discovered yet another Android Trojan that uses push notifications to trick users into subscribing to dubious sites. The Trojan is known under the Android.FakeApp.174 detection name. Android.FakeApp.174 In Detail Android.FakeApp.174 uses Google Chrome to load questionable websites that…

CYBER NEWS

Microsoft Fails to Patch Zero-Day Bug in Windows SymCrypt

Tavis Ormandy, security researcher at Google’s Project Zero, has “noticed a bug in SymCrypt, the core library that handles all crypto on Windows.” The bug is a zero-day of the DoS (denial-of-service) type. The bug means that “basically anything that…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree