Cyber News - Page 17

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
PoC Code for CVE-2010-1622 Puts Spring Core Framework at Risk

PoC Code for CVE-2010-1622 Puts Spring Core Framework at Risk

Another day, another zero-day. This time, security researchers discovered a bypass for an older zero-day, remote code execution flaw in the Spring Core framework, shortly after a proof-of-concept exploit was leaked to GitHub. Spring Core is a widely known Java…

CYBER NEWS
 CVE-2022-27254,

CVE-2022-27254 Affects the Remote Keyless System of Honda Vehicles

A new proof-of-concept (PoC) code shows that attackers can remotely lock, unlock, and start Honda and Acura vehicles. This is possible due to a vulnerability in the remote keyless system, CVE-2022-27254, that impacts Honda Civic LX, EX, EX-L, Touring, Si,…

CYBER NEWS
CVE-2022-22274 SonicWall Vulnerability Could Cause RCE, DoS Attacks

CVE-2022-22274 SonicWall Vulnerability Could Cause RCE, DoS Attacks

There’s a new SonicWall vulnerability, identified as CVE-2022-22274. The vulnerability is critical, and resides in multiple firewall appliances. If weaponized, remote threat actors could perform arbitrary code execution and cause a denial-of-service (DoS) condition. CVE-2022-22274 SonicWall Vulnerability: Technical Description According…

CYBER NEWS
CVE-2022-1040: Critical Sophos Firewall Vulnerability

CVE-2022-1040: Critical Sophos Firewall Vulnerability

A critical security vulnerability in Sophos Firewall was just disclosed. CVE-2022-1040 Sophos Firewall Vulnerability Tracked as CVE-2022-1040, the vulnerability is an authentication bypass in the User Portal and webadmin that could allow attackers to perform remote code execution attacks. Affected…

CYBER NEWS
windows user security bible

The Windows User Security Bible: Vulnerabilities and Patches

If you’re one of those conscious users who acquaint themselves with the software before they install it onto their computers, Microsoft security updates included, then this article is for you. When you pay attention to the small print, and in…

CYBER NEWS
Preach About the Breach- CVE and Incident Response

Preach About the Breach: CVE and Incident Response

Vulnerabilities, vendors and enterprises. The three words often come together, to the horror of all concerned sites. Enterprises often lack sufficient patch management policy and incident response groups, or disregard the importance of proper education on security-related subjects. Thus, the…

CYBER NEWS
Elden Ring Players Caught in a Death Loop Due to Vulnerability

Elden Ring Players Caught in a Death Loop Due to Vulnerability

Do you play Elden Ring? Then note that security researchers disclosed a vulnerability in the game that traps players in an infinite death loop. Have You Been Trapped in an Elden Ring Death Loop? Reportedly, the latest version of the…

CYBER NEWS
CVE-2022-0543 Used in Attacks Against Redis Servers

CVE-2022-0543 Used in Attacks Against Redis Servers

А recently discovered Redis vulnerability has been used in attacks against servers. According to the official advisory, Redis, a persistent key-value database, due to a packaging issue, is prone to a Debian-specific, Lua sandbox escape. Exploiting the vulnerability could result…

CYBER NEWS
zero-day

CVE-2022-1096 Chromium Vulnerability Exploited in the Wild

If you haven’t updated your Chrome browser to version 99.0.4844.84, you should do it immediately. If you don’t, you are risking your security, as Google recently reported a new vulnerability in Chrome. The vulnerability in question has been described as…

CYBER NEWS
Decrypting Files Encrypted by Diavol Ransomware: Mission Possible

Decrypting Files Encrypted by Diavol Ransomware: Mission Possible

Last July, we wrote about the emergence of a new ransomware, known as Diavol. Fortunately, security researchers were able to develop a decryption tool to help victims of the ransomware restore their files. Diavol Ransomware Decryption Tool Now Available Diavol…

CYBER NEWS
VMware Discloses Critical Vulnerabilities CVE-2022-22951, CVE-2022-22952

VMware Discloses Critical Vulnerabilities CVE-2022-22951, CVE-2022-22952

Two new VMware vulnerabilities have been disclosed, CVE-2022-22951 and CVE-2022-22952, both rated 9.1 on the CVSS scale. The flaws affect the Carbon Black App Control platform, and could be exploited in arbitrary code execution attacks against vulnerable Windows systems. The…

CYBER NEWS
Mustang Panda Threat Group Releases New Hodur Malware

Mustang Panda Threat Group Releases New Hodur Malware

Security researchers discovered a new malware distributed in a still-ongoing malicious campaign, called Hodur. The malware is similar to a previous malware, called Thor, and had been attributed to the Chinese Mustang Panda threat group. Hodur Backdoor Malware Campaign: What…

CYBER NEWS
New Gimmick Malware Currently Targeting macOS Users

New Gimmick Malware Currently Targeting macOS Users

A new macOS variant of a malware implant has been discovered. The so-called Gimmick malware is attributed to a threat group, known as Storm Cloud. The Gimmick malware has been described as feature-rich and multi-platform, using public cloud hosting services,…

CYBER NEWS
Dell BIOS Vulnerabilities Could Cause Remote Code Execution (CVE-2022-24415)

Dell BIOS Vulnerabilities Could Cause Remote Code Execution (CVE-2022-24415)

Security researchers reported several new vulnerabilities in Dell BIOS that could lead to remote code execution attacks. The said, highly severe vulnerabilities are tracked as CVE-2022-24415, CVE-2022-24416, CVE-2022-24419, CVE-2022-24420, and CVE-2022-24421, with a severity rating of 8.2 out of 10…

CYBER NEWS
New Browser-in-the-Browser Technique Makes Phishing Indistinguishable

New Browser-in-the-Browser Technique Makes Phishing Indistinguishable

Browser-in-the-browser (BitB) is a new type of attack that can be leveraged to simulate a browser window within the browser to spoof a legitimate domain. The technique can be used to perform credible phishing attacks. Browser-in-the-Browser Phishing Technique Explained Discovered…

CYBER NEWS
A new rootkit has been detected in the wild, targeting Oracle Solaris systems and aiming at ATMs.

Researchers Observe New CAKETAP Rookit Deployed against ATMs

A new rootkit has been detected in the wild, targeting Oracle Solaris systems and aiming at ATMs. According to Mandiant research and analysis, the so-called UNC2891 threat actors initiated rootkit intrusions that appeared to be financially motivated, in some cases…

CYBER NEWS
DirtyMoe worming malware

DirtyMoe Worming Malware Endangers Hundreds of Thousands Computers Per Day

DirtyMoe is the name of a new malware sample with worming capabilities (with cryptomining as a primary purpose) analyzed by Avast researchers. The analysis reveals that the worming module targets older, well-known vulnerabilities, such as Eternal blue and Hot Potato.…

CYBER NEWS
Protestware Projects on GitHub Push Pro-Ukraine Ads and Data Wipers

Protestware Projects on GitHub Push Pro-Ukraine Ads and Data Wipers

Have you heard of protestware? Researchers have been tracking the so-called protestware projects across GitHub with recently added code that displays “Stand with Ukraine” messages. The same researchers are also tracking several code packages, recently modified to delete files on…

CYBER NEWS
The Most Prevalent Ransomware Variants in Q4 of 2021

The Most Prevalent Ransomware Variants in Q4 of 2021

A new Intel 471 whitepaper throws light on the ransomware variants detected in the fourth quarter of 2021. 722 ransomware attacks were detected during the fourth quarter of last year, which is an increase of 110 attacks recorded from the…

CYBER NEWS
caddywiper

CaddyWiper: Another Destructive Wiper Targeting Ukraine

Security researchers disclose another data wiper aimed at Ukraine, CaddyWiper. CaddyWiper Was Compiled Hours Before Deployment CaddyWiper is a destructive malware discovered by ESET researchers. The wiper was first observed on March 14, around 9:38 UTC, and according to caddy.exe…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree