Cyber News - Page 15

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
Linux Threat Alert: VMware ESXi Servers Targeted by Cheerscrypt Ransomware

Linux Threat Alert: VMware ESXi Servers Targeted by Cheerscrypt Ransomware

Security researchers discovered a new ransomware family that targets Linux systems. Called Cheerscrypt, the ransomware targets VMware ESXi servers. It is noteworthy that last year two vulnerabilities in the VMWare ESXi product were included in the attacks of at least…

CYBER NEWS
Malicious Python Package [pymafka] Drops Cobalt Strike on macOS, Windows and Linux

Malicious Python Package [pymafka] Drops Cobalt Strike on macOS, Windows and Linux

Security researchers detected a “mysterious” malicious Python package that downloads the Cobalt Strike malware on Windows, Linux, and macOS systems. Called “pymafka,” the package masquerades as the legitimate popular library PyKafka, a programmer-friendly Kafka client for Python. According to Sonatype…

CYBER NEWS
CVE-2022-1802, CVE-2022-1529: Critical Vulnerabilities in Mozilla Firefox

CVE-2022-1802, CVE-2022-1529: Critical Vulnerabilities in Mozilla Firefox

Mozilla released a new version of its Firefox browser (100.0.2) fixing a set of two critical security vulnerabilities. The patches make this minor update quite significant in importance. Affected versions include Firefox, Firefox ESR, Firefox for Android, and Thunderbird (Firefox…

CYBER NEWS
CVE-2021-22573 is a vulnerability in Google’s OAuth client for Java

CVE-2021-22573: Google OAuth Java Client Vulnerability

CVE-2021-22573 is a vulnerability in Google’s OAuth client for Java, with a severity score of 8.7 out of 10 on the CVSS scale. What Causes the CVE-2021-22573 Vulnerability? The vulnerability stems from the fact that “IDToken verifier does not verify…

CYBER NEWS
UpdateAgent Dropper Returns in New Campaigns Targeting Mac Users

UpdateAgent Dropper Returns in New Campaigns Targeting Mac Users

UpdateAgent is a malware dropper with a well-built infrastructure targeting macOS systems, and it seems that it has been updated once again. According to Jamf Threat Labs, changes were implemented to the dropper, primarily focused on new executables written in…

CYBER NEWS

5 macOS Vulnerabilities that Shouldn’t Be Overlooked

macOS is generally believed to be bulletproof against malware attacks. Unfortunately, statistics reveal a different picture where Apple’s operating system is often found vulnerable. For instance, in 2017 security researchers detected an increase of 28.83 percent of total reported security…

CYBER NEWS
Google Play Plagued by 200 Fake Apps Delivering Facestealer Spyware

Google Play Plagued by 200 Fake Apps Delivering Facestealer Spyware

A new report sheds some light on an extensive fake Android app campaign that distributes the Facestealer spyware. New Campaign of Fake Android Apps Delivers Facestealer Spyware First documented in July 2021, the malware is designed to steal logins and…

CYBER NEWS
CVE-2022-22675: Zero-Day Vulnerability in macOS and watchOS

CVE-2022-22675: Zero-Day Vulnerability in macOS and watchOS

A zero-day vulnerability in Macs and Apple watches has been fixed. The vulnerability, assigned the CVE-2022-22675 number, could have been exploited in the wild, Apple said. The flaw was most probably used in targeted attacks. However, applying the update immediately…

CYBER NEWS
Eternity Project Malware-as-a-Service Sold on Telegram

Eternity Project Malware-as-a-Service Sold on Telegram

Eternity Project is the name of a malware toolkit which is currently in active development and is being sold as malware-as-a-service. Researchers are still unaware of the threat actor selling the malware that enables amateur hackers to get hold of…

CYBER NEWS
Massive WordPress Campaign Takes Users through Malicious Redirect Chains

Massive WordPress Campaign Takes Users through Malicious Redirect Chains

Security researchers have identified a malicious campaign against WordPress sites. The campaign uses known vulnerabilities in WordPress themes and plugins, and has affected thousands of websites. Malicious Campaign Compromises WordPress Sites: the Details According to data shared by PublicWWW, at…

CYBER NEWS
HP Vulnerabilities Allow Hackers Run Code with Kernel Privileges (CVE-2021-3808)

HP Vulnerabilities Allow Hackers Run Code with Kernel Privileges (CVE-2021-3808)

HP has fixed two high-severity BIOS vulnerabilities in many of its PC and notebook products. The vulnerabilities, tracked as CVE-2021-3808 and CVE-2021-3809, could allow threat actors to run code with kernel privileges. This type of attack can be described as…

CYBER NEWS
REvil Ransomware Is Returning with New Modified Samples

REvil Ransomware Is Returning with New Modified Samples

Security researchers say that the notorious ransomware REvil, also known as Sodinokibi, has returned after laying low for six months. The Return of REvil/Sodinokibi Ransowmare Gang According to Secureworks Counter Threat Unit (CTU) researchers, analysis of some recently uploaded to…

CYBER NEWS
CVE-2022-29972

CVE-2022-29972 Azure Vulnerability Could Allow Remote Execution Attacks

CVE-2022-29972 is a security vulnerability in Azure Synapse and Azure Data Factory pipelines that could let threat actors execute remote commands in the Integration Runtime Infrastructure (IR). Microsoft explains that the IR is a compute infrastructure utilized by Azure Data…

CYBER NEWS
Critical F5 BIG-IP Flaw CVE-2022-1388 Is Exploited in the Wild

Critical F5 BIG-IP Flaw CVE-2022-1388 Is Exploited in the Wild

CVE-2022-1388 is a critical remote code execution vulnerability that affects F5 BIG-IP multi-purpose networking devices and modules. There are now warnings about in-the-wild exploit attempts weaponizing the vulnerability, in addition to an available PoC (proof of concept) developed by security…

CYBER NEWS
CVE-2022-20777: Cisco Vulnerability Could Allow Unauthorized Root-Level Access

CVE-2022-20777: Cisco Vulnerability Could Allow Unauthorized Root-Level Access

Cisco patched three security vulnerabilities affecting its Enterprise NFV Infrastructure Software. The flaws could allow an attacker to obtain full control of the exposed hosts. It is important to note that the vulnerabilities, tracked as CVE-2022-20777, CVE-2022-20779, and CVE-2022-20780, are…

CYBER NEWS
Black Basta: New Ransomware on the Rise

Black Basta: New Ransomware on the Rise

Black Basta is a new ransomware first detected in the middle of April 2022. According to Minerva researchers, the ransomware “has already caused substantial damage to over ten organizations.” Two of its recent victims include Deutsche Windtechnik and the American…

CYBER NEWS
Security Researcher Discovers Vulnerabilities in Popular Ransomware Families

Security Researcher Discovers Vulnerabilities in Popular Ransomware Families

A security researcher known by the moniker h3perlinx discovered vulnerabilities in some of the most common ransomware families, including Conti, REvil, LockBit, AvosLocker, and the recently discovered Black Basta. Security Researcher Discovers Weaknesses in Popular Malware The discovered weaknesses could…

CYBER NEWS
phishing campaign exploiting google SMTP service

Google’s SMTP Service Exploited in Phishing Attacks

A new phishing attack leveraging Google’s SMTP relay service has been detected delivering phishing emails to users. The attack has been observed by Avanan security researchers. Google’s SMTP Service Abused What is SMTP? This type of service helps businesses send…

CYBER NEWS
New Bumblebee Malware Downloader Used for Initial Network Access

New Bumblebee Malware Downloader Used for Initial Network Access

Bumblebee is the name of a new malware downloader used by multiple threat actors that previously delivered BazaLoader and IcedID. In other words, these threat actors have replaced the two malware pieces with the newer Bumblebee. BazaLoader, in particular, hasn’t…

CYBER NEWS
most-exploited-vulnerabilities-2021-sensorstechforum

The Most Exploited Vulnerabilities in 2021 Include CVE-2021-44228, CVE-2021-26084

Which were the most routinely exploited security vulnerabilities in 2021? A new report released by CISA in cooperation with the authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom revealed an advisory containing the most exploited…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree