Cyber News

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
CVE-2024-38193 Microsoft details

CVE-2024-38193 Exploited by Lazarus Group in Targeted Attacks

A newly patched security vulnerability in Microsoft Windows has been actively exploited by the Lazarus Group, a notorious state-sponsored hacking group associated with North Korea. The flaw, identified as CVE-2024-38193 and rated with a CVSS score of 7.8, is a…

CYBER NEWS
Sitting Ducks DNS Attack Explained

Over a Million Domains Vulnerable to Sitting Ducks DNS Attack

A new type of DNS attack puts millions of domains at risk of malware and hijacking, a recent report finds. A joint analysis by Infoblox and Eclypsium has uncovered that over a million domains are at risk of being hijacked…

CYBER NEWS
The Dark Angels Attack and Its Aftermath

Fortune 50 Company Pays Record $75M Ransom to Dark Angels

A Fortune 50 company has reportedly paid a record-breaking $75 million ransom to the Dark Angels ransomware gang, according to Zscaler ThreatLabz. This payment surpasses the previous record of $40 million, paid by insurance giant CNA after an Evil Corp…

CYBER NEWS
BadPack Android Malware

BadPack Android Malware: Difficult to Detect and Remove

BadPack is a malicious APK file intentionally altered to exploit the Android operating system’s file structure. Typically, attackers maliciously modify the header information in the compressed file format of APKs to hinder reverse engineering efforts. These tampered headers are a…

CYBER NEWS
Microsoft Fights Global Outage - Developments So Far

Microsoft Fights Global Outage – Developments So Far

In an unexpected and chaotic turn of events, a significant IT outage disrupted major institutions globally. Here’s the latest information: Microsoft Azure Services Severely Impacted Last night, Microsoft Azure services experienced a major disruption, leaving many customers frustrated. The Central…

CYBER NEWS
EstateRansomware profile

EstateRansomware Targets Veeam Backup: CVE-2023-27532 Exploited

CVE-2023-27532, a significant flaw identified in Veeam Backup & Replication software, exposes organizations to unauthorized access risks and shows the vital need for up-to-the-minute vigilance in data protection strategies. A new ransomware player, called EstateRansomware, has recently exploited the vulnerability…

CYBER NEWS
CVE-2024-5035 Critical Vulnerability in TP-Link Archer C5400X Gaming Router

CVE-2024-5035: Critical Flaw in TP-Link Archer C5400X Gaming Router

Security researchers identified a critical security vulnerability in the TP-Link Archer C5400X gaming router, which could easily allow remote code execution through specially crafted requests. The flaw has been tracked as CVE-2024-5035, and is assigned the highest possible severity score…

CYBER NEWS
Atlassian Vulnerability Used to Deploy Linux Variant of Cerber Ransomware

Atlassian Vulnerability Used to Deploy Linux Variant of Cerber Ransomware

Threat actors are exploiting critical vulnerabilities in Atlassian servers to deploy a Linux variant of Cerber ransomware. This exploitation, centered around the CVE-2023-22518 vulnerability, has exposed serious weaknesses in the Atlassian Confluence Data Center and Server, allowing malicious actors to…

CYBER NEWS
New Native Spectre v2 Exploit Raises Concerns for Linux Kernel Security

New Native Spectre v2 Exploit Raises Concerns for Linux Kernel Security

Cybersecurity researchers from the Systems and Network Security Group (VUSec) at Vrije Universiteit Amsterdam have unveiled what they describe as the “first native Spectre v2 exploit” against the Linux kernel on Intel systems. This exploit, named Native Branch History Injection…

CYBER NEWS
Google Introduces V8 Sandbox in Chrome to Enhance Security

Google Introduces V8 Sandbox in Chrome to Enhance Security

Google has unveiled a new feature called the V8 Sandbox in its Chrome web browser to address memory corruption issues, aiming to protect against vulnerabilities. “After almost three years since the initial design document and hundreds of CLs in the…

CYBER NEWS
HTTP2 Flaw Puts Web Servers at Risk of DoS Attacks [CVE-2024-27983]

HTTP/2 Flaw Puts Web Servers at Risk of DoS Attacks [CVE-2024-27983]

A new research conducted by security expert Bartek Nowotarski has unearthed a potential vulnerability in the HTTP/2 protocol. Known as the CONTINUATION Flood, this exploit allows attackers to conduct denial-of-service (DoS) attacks by flooding a server with CONTINUATION frames. The…

CYBER NEWS
CVE-2024-3094 Malicious Code in XZ Utils Enables RCE on Linux Systems

CVE-2024-3094: Malicious Code in XZ Utils Enables RCE on Linux Systems

A recent analysis has revealed that the malicious code embedded in the widely-used open-source library XZ Utils (present in multiple Linux distros) can enable remote code execution. The attack scenario is based on the critical CVE-2024-3094 vulnerability. CVE-2024-3094 Explained This…

CYBER NEWS
Google to Erase Billions of Incognito Mode Browsing Records

Google to Erase Billions of Incognito Mode Browsing Records

In response to a class action lawsuit filed in 2020, Google has opted to settle by agreeing to delete billions of data records concerning users’ browsing activities. The lawsuit alleged that Google tracked users without their consent while using the…

CYBER NEWS
Call of Duty Players Targeted in Bitcoin Malware Attack

“Call of Duty” Players Targeted in Bitcoin Malware Attack

In a startling development, gamers playing “Call of Duty” have fallen victim to a sophisticated cyber attack aimed at draining Bitcoin wallets. The attack, orchestrated through third-party cheat software, has sent shockwaves through the gaming community, raising concerns about the…

CYBER NEWS
CVE-2024-28085 Linux Flaw Could Leak Passwords

CVE-2024-28085: Linux Flaw Could Leak Passwords

A recently identified vulnerability affecting the “wall” command in the util-linux package has raised concerns among Linux users. Assigned CVE-2024-28085 and named WallEscape by security researcher Skyler Ferrante, the flaw allows unprivileged users to manipulate terminal output, potentially leaking passwords…

CYBER NEWS
CVE-2024-21388 Enables Silent Installation of Malicious Extensions

CVE-2024-21388 Enables Silent Installation of Malicious Extensions

A recently patched security vulnerability in Microsoft Edge could have allowed malicious actors to stealthily install arbitrary extensions on users’ systems, potentially leading to harmful actions. CVE-2024-21388 Explained Discovered by Guardio Labs security researcher Oleg Zaytsev and tracked as CVE-2024-21388,…

CYBER NEWS
CVE-2023-48022 ShadowRay Flaw a Critical Threat to AI Infrastructure

CVE-2023-48022: ShadowRay Flaw a Critical Threat to AI Infrastructure

The Oligo research team recently uncovered an ongoing attack campaign, dubbed ShadowRay, targeting a vulnerability in Ray, a widely utilized open-source AI framework. This vulnerability, currently unresolved and lacking a patch, poses a critical threat to thousands of companies and…

CYBER NEWS
Apple M-1, M-2 Chips Vulnerable to GoFetch Attack, Encryption Keys Exposed

Apple M-1, M-2 Chips Vulnerable to GoFetch Attack, Encryption Keys Exposed

Researchers unearthed a significant vulnerability lurking within Apple’s M-1 and M-2 chips, potentially exposing a chink in the armor of the tech giant’s acclaimed security infrastructure. Dubbed “GoFetch,” this exploit targets the microarchitecture of Apple’s chips, exploiting a flaw that…

CYBER NEWS
New Loop DoS Attack Based on CVE-2024-2169 in UDP Protocol

New Loop DoS Attack Based on CVE-2024-2169 in UDP Protocol

A newly identified denial-of-service attack, named Loop DoS, is causing concerns among cybersecurity experts. This sophisticated attack targets application layer protocols and can lead to large-scale traffic disruptions by creating indefinite communication loops between network services. Researchers at the CISPA…

CYBER NEWS
Operation PhantomBlu Phishing Attack Uses MS Documents to Deliver NetSupport RAT-min

Operation PhantomBlu Phishing Attack Uses MS Documents to Deliver NetSupport RAT

A sophisticated phishing campaign against U.S. organizations has been deploying a remote access trojan known as NetSupport RAT. Dubbed “Operation PhantomBlu,” the activity has been closely monitored by Israeli cybersecurity firm Perception Point. According to security researcher Ariel Davidpur, the…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree