Cyber News - Page 19

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
CryptBot Infostealer Distributed by Pirated Software Websites

CryptBot Infostealer Distributed by Pirated Software Websites

Another information stealer is being distributed with the help of pirated software websites. CryptBot, a well-known infostealer, has been “seen” on numerous sites that offer free downloads for cracked games and pro-grade software. CryptBot: A Constantly Evolving Infostealer Cryptbot has…

CYBER NEWS
OpenSea smart contracts nfts-sensorstechforum

OpenSea Phishing Attack Results in Loss of $3 Million in NFTs

An NFT-related cybersecurity incident involving the OpenSea NFT marketplace took place over the weekend. Apparently, threat actors exploited a smart contract migration to deceit 17 users, resulting in a loss of nearly 3 million dollars worth of NFTs (non-fungible tokens).…

CYBER NEWS
Hive Ransomware Can Be Decrypted Using This Unique Method

Hive Ransomware Can Be Decrypted Using This Unique Method

Great news for Hive ransomware victims – security researchers found a way to decipher its encryption algorithm without using the master key. A group of academics from South Korea’s Kookmin University have shared their curious findings in a detailed report…

CYBER NEWS
CVE-2022-24087: Yet Another Critical Bug in Adobe Magento

CVE-2022-24087: Yet Another Critical Bug in Adobe Magento

CVE-2022-24087 is another critical vulnerability that Adobe had to address quickly, following the disclosure of CVE-2022-24086. CVE-2022-24087: New Critical Adobe Bug CVE-2022-24086 is a critical, zero-day security vulnerability that affected Adobe’s Commerce and Magento open-source products. The vulnerability, which has…

CYBER NEWS

NFT Security and Risks: How Secure Are Your Digital Assets?

There’s hardly anyone today who hasn’t heard about NFTs. However, how many of us do actually understand the concept of NFT? Being a cybersecurity website, we decided to have a look at the security side of the so-called non-fungible tokens.…

CYBER NEWS
Google Working on Privacy Sandbox on Android to Limit User Data Sharing

Google Working on Privacy Sandbox on Android to Limit User Data Sharing

Google recently announced “a multi-year initiative to build the Privacy Sandbox on Android”. The Goal of Privacy Sandbox on Android The goal of the initiative is introducing new, more privacy-oriented advertising solutions that will limit the sharing of user data…

CYBER NEWS
New Version of MyloBot Malware Used in Sextortion Campaigns

New Version of MyloBot Malware Used in Sextortion Campaigns

A new variant of the MyloBot malware is used in sextortion campaigns. Apparently, the malware deploys malicious payloads that hackers use to send sextortion emails with demands of $2,732 in cryptocurrency. New Version of MyloBot Detected Minerva researchers recently came…

CYBER NEWS
CVE-2022-0609: Zero-Day Bug in Chrome Exploited in the Wild

CVE-2022-0609: Zero-Day Bug in Chrome Exploited in the Wild

CVE-2022-0609 is a new zero-day vulnerability in Google Chrome which has been used by threat actors in attacks. CVE-2022-0609 in Google Chrome – What Is Known? Google has already released Chrome 98.0.4758.102 for Windows, Mac, and Linux to address the…

CYBER NEWS
CVE-2022-24086: Zero-Day in Adobe Commerce and Magento Platforms

CVE-2022-24086: Zero-Day in Adobe Commerce and Magento Platforms

CVE-2022-24086 is a critical, zero-day security vulnerability affecting Adobe’s Commerce and Magento open-source products. The vulnerability, which has a CVSS score of 9.8 out of 10, is actively exploited in the wild in limited attacks. Fortunately, a patch is already…

CYBER NEWS
Threat Actors Exploit Windows Service Regsvr32 to Deliver Malware

Threat Actors Exploit Windows Service Regsvr32 to Deliver Malware

Security researchers have been observing an increasing exploitation of regsvr32.exe, which is a Windows living-off-the-land binary, shortly known as LOLBin. Some of the analyzed malware samples belong to Qbot and Lokibot, according to Uptycs researchers. Threat Actors Abusing Regsvr32 What…

CYBER NEWS
Android Threat Alert: FluBot and Medusa Trojans in Simultaneous Attacks

Android Threat Alert: FluBot and Medusa Trojans in Simultaneous Attacks

Currently, active campaigns against Android users are carrying FluBot and Medusa banking trojans. Both trojans are using the same distribution mechanism in a simultaneous attack campaign. The discovery comes from security researchers at ThreatFabric. Medusa and FluBot Trojans Working Together…

CYBER NEWS
CVE-2022-24348: A Major Supply Chain Zero-Day in Argo CD

CVE-2022-24348: A Major Supply Chain Zero-Day in Argo CD

CVE-2022-24348 is a high-severity security vulnerability in Argo CD that could enable threat actors to access a victim’s application-development environments, making it possible to harvest passwords, API keys, tokens, among other sensitive details. CVE-2022-24348 in Argo CD Needs Immediate Patching…

CYBER NEWS
CVE-2022-21882

Patch Now: CVE-2022-21882 Elevation of Privilege Windows Vulnerability

According to an alert released by CISA (U.S. Cybersecurity and Infrastructure Agency), federal agencies should immediately address CVE-2022-21882, a Win32k Elevation of Privilege vulnerability. CVE-2022-21882 Elevation of Privilege Windows Vulnerability The Windows flaw could be exploited by threat actors to…

CYBER NEWS
Hackers Use SEO Poisoning to Deliver the BATLOADER Malware

Hackers Use SEO Poisoning to Deliver the BATLOADER Malware

Security researchers recently uncovered a malicious campaign using SEO poisoning to trick potential victims into downloading the BATLOADER malware. The attackers used created malicious sites packed with keywords of popular software products, and used search engine optimization poisoning to make…

CYBER NEWS
Wormhole Cryptocurrency Platform Loses $322 Million in a Hack

Wormhole Cryptocurrency Platform Loses $322 Million in a Hack

Wormhole is the latest cryptocurrency platform to be hacked in a $322 million heist. Hackers successfully exploited a vulnerability in the platform and stole approximately $322 million worth of Ether. The attack occurred on February 2 and affected the Wormhole…

CYBER NEWS
CVE-2021-41837

23 Vulnerabilities in UEFI Firmware Used by HP, Lenovo (CVE-2021-41837)

At least 23 new security vulnerabilities were discovered in various implementations of UEFI (Unified Extensible Firmware Interface) firmware implemented by multiple vendors, such as HP, Lenovo, Juniper Networks, and Fujitsu. The flaws are located in Insyde Software’s InsydeH2O UEFI firmware,…

CYBER NEWS
deadbolt ransomware

New Deadbolt Ransomware Hits 3,600 QNAP NAS Devices

Deadbolt ransomware recently compromised more than 3,600 QNAP network-attached storage (NAS) devices. As a result of the attack, all data located on the devices has been encrypted by Deadbolt, which is a new strain of ransomware. Deadbolt Ransomware Hits QNAP…

CYBER NEWS
CVE-2021-44142 Samba Vulnerability Allows Code Execution

CVE-2021-44142 Samba Vulnerability Allows Code Execution

CVE-2021-44142 Samba Flaw CVE-2021-44142 is one of several vulnerabilities detected in Samba versions before 4.13.17. The vulnerability is related to an out-of-bounds heap read/write issue in the VFS module. This module, known as vfs_fruit, provides compatibility with Apple SMB clients.…

CYBER NEWS
Zero-Day Vulnerabilities in Safari Expose Your macOS Camera

Zero-Day Vulnerabilities in Safari Expose Your macOS Camera

Security researcher Ryan Pickren recently discovered and reported to Apple a set of macOS vulnerabilities that exposed Safari browser. 4 New Zero-Days Reported to Apple The researcher’s hack “successfully gained unauthorized camera access by exploiting a series of issues with…

CYBER NEWS
2fa authenticator malicious app

2FA Authenticator App Downloaded Vultur Trojan on 10,000 Android Devices

A new malicious campaign targeting Android users via a trojan app has been detected in the wild. The payload of the campaign is the Vultur trojan that harvests banking credentials, among other malicious activities. The culprit, a malicious two-factor authentication…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree