Cyber News - Page 20

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
CVE-2021-44757: Authentication Bypass Flaw in Zoho Desktop Central

CVE-2021-44757: Authentication Bypass Flaw in Zoho Desktop Central

An authentication bypass vulnerability was recently identified and patched in Zoho Desktop Central and Desktop Central MSP. CVE-2021-44757: Authentication Bypass Vulnerability in Zoho Desktop Central Known as CVE-2021-44757, the flaw has now been addressed and released in the company’s latest…

CYBER NEWS
VPNLab taken down

Europol Takes Down VPNLab, Hackers’ Favorite VPN Service

There’s a solid win for law enforcement in the battle with cybercriminals. Apparently, according to an official Europol statement, law enforcement authorities took action against the criminal misuse of VPN services, as they targeted the users and infrastructure of VPNLab.net.…

CYBER NEWS
North Korea-Linked Lazarus APT Hackers Stole $400M in Cryptocurrency

North Korea-Linked Lazarus APT Hackers Stole $400M in Cryptocurrency

According to a Chainanalysis report, North Korean hackers had a very successful 2021 year. As a result of launching at least seven large-scale attacks against cryptocurrency platforms, they made approximately $400 million worth of digital assets. Targets of the attacks…

CYBER NEWS
sysjoker malware

SysJoker Backdoor Targets macOS, Windows and Linux Users

Security researchers reported a new backdoor capable of targeting Windows, macOS, and Linux operating systems. SysJoker Backdoor Technical Overview Called SysJoker, the multi-platform malware is currently not detected by any of the security engines in VirusTotal. SysJoker was discovered by…

CYBER NEWS
SilentXMRMiner Hides in Torrents of Spiderman: No Way Home Movie

SilentXMRMiner Hides in Torrents of Spiderman: No Way Home Movie

One of the latest malicious campaigns detected in the wild is taking advantage of the new Spiderman: No Way Home movie. SilentXMRMiner Hides in Spiderman Movie ReasonLabs researchers recently detected a Monero miner in a torrent download of the Spider-Man:…

CYBER NEWS
Half a Billion Stolen Passwords Discovered in Open Cloud Server

Half a Billion Stolen Passwords Discovered in Open Cloud Server

Half a billion stolen credentials were discovered in a compromised cloud storage facility, according to the National Crime Agency’s National Cyber Crime Unit in the U.K. Since the data came from various sources and couldn’t be linked to a specific…

CYBER NEWS
Meta (Facebook) Files Lawsuit Against 39,000 Phishing Sites

Meta (Facebook) Files Lawsuit Against 39,000 Phishing Sites

Meta, formerly Facebook, has filed a federal lawsuit in California court to disrupt phishing attacks, according to a company’s statement. Meta Files Lawsuit Against Phishing The purpose of the lawsuit is to fight phishing attacks that aim to obtain users’…

CYBER NEWS
35,000 Java Packages Affected by Log4j Exploit, Google Says

35,000 Java Packages Affected by Log4j Exploit, Google Says

35,000 Java Packages Impacted by the Log4j Vulnerabilities Google says that more than 35,000 Java packages are currently impacted by the Log4j vulnerabilities, “with widespread fallout across the software industry.” This amounts to more than 8% of the Maven Central…

CYBER NEWS
CVE-2021-22057: 2FA Issue in VMware Workspace ONE Access

CVE-2021-22057: 2FA Issue in VMware Workspace ONE Access

A new VMware vulnerability should be patched immediately to avoid any exploitation. CVE-2021-22057 in VMware Workspace ONE Access CVE-2021-22057 is a critical vulnerability in VMware Workspace ONE Access that specifically affects its two factor authentication (2FA) processing component. Currently, little…

CYBER NEWS
PseudoManuscrypt Spyware Distributed in Pirated Software

Beware: PseudoManuscrypt Spyware Distributed in Pirated Software

Security researchers detected a new mass malware campaign associated with the previously known Manuscrpypt loader, which is part of Lazarus APT group arsenal. The discovery comes from Kaspersky’s Secure List. “Curiously, the data exfiltration channel of the malware uses an…

CYBER NEWS
Twizt, New Variant of Phorpiex Botnet, Used in Crypto-Clipping Attacks

Twizt, New Variant of Phorpiex Botnet, Used in Crypto-Clipping Attacks

Phorpiex is a well-known malware that has been operating at least since 2016, initially known as a botnet using the IRC protocol. A couple of years later, the botnet’s infrastructure changed to Tldr – a loader controlled via HTTP. The…

CYBER NEWS
scraping added to meta bug bounty program -sensorstechforum

Facebook (Meta) Adds Scraping Attacks to Its Bug Bounty Program

Meta, formerly Facebook, is adding scraping attacks to its bug bounty program, according to a statement the company made. Scraping is an issue that Facebook has been struggling with in the past. Because of this, two areas of research for…

CYBER NEWS
DarkWatchman-Trojan-sensorstechforum.jpg

New DarkWatchman RAT Trojan Used for Ransomware Deployment

DarkWatchman is the name of a new JavaScript-based remote access trojan (RAT). Currently, the RAT is being distributed in the wild via malicious emails. The malware uses the domain generation algorithm (DGA) technique to identify its Command and Control (C2)…

CYBER NEWS
CVE-2021-44228 Used by Attackers to Drop Khonsari Ransomware

CVE-2021-44228 Used by Attackers to Drop Khonsari Ransomware

Khonsari is a novel ransomware family currently attempting to exploit the critical Apache Log4j vulnerability, also known as CVE-2021-44228, Log4Shell and Logjam. Apache Log4j Vulnerability: CVE-2021-44228 According to the National Vulnerability Database, “Apache Log4j2

CYBER NEWS
russia-blocks-access-to-tor-sensorstechforum

Russia Blocks Access to Tor Anonymity Network

Censorship has reached another level in Russia with the country’s decision to fully ban access to the Tor network. In addition to Tor, six other virtual network providers (VPNs) were banned in an attempt to control the internet and prevent…

CYBER NEWS
Cryptocurrency Support Scam Bot Targets MetaMask, TrustWallet

Cryptocurrency Support Scam Bot Targets MetaMask, TrustWallet

A cryptocurrency support scam bot that was discovered in May has now evolved. As a result, more cryptocurrency users are targeted. How Does the Cryptocurrency Support Scam Bot Operate? How does the scam operate? Scammers closely monitor all tweets that…

CYBER NEWS
BlackCat (ALPVH): New Sophisticated RaaS Coded in Rust

BlackCat (ALPVH): New Sophisticated RaaS Coded in Rust

A new ransomware-as-a-service player has been detected by Recorded Future and MalwareHunterTeam on two underground forums. Known as ALPVH and BlackCat, the ransomware group is the first to use Rust, The Record reported. This is the third ransomware strain to…

CYBER NEWS
The State of Identity Fraud Identity Fraud Report 2022-sensorstechforum

The State of Identity Fraud (Identity Fraud Report 2022)

What is the current state of identify fraud, and where is this cybercrime trend headed in 2022? The state of identity fraud According to a new report by Onfido, identity fraud has increased with 44% since 2019. Since more businesses…

CYBER NEWS
Google-and-Cloudflare-Disrupt-Glupteba-Cryptomining-Operation

Google and Cloudflare Disrupt Glupteba Cryptomining Operation

Glupteba is a well-known cryptocurrency mining trojan operating that has been active for a few years. The mining operation has now been disrupted, thanks to a coordinated effort by Google and Cloudflare. According to Google’s announcement, the company “has taken…

CYBER NEWS
Magnat Malvertising Uses Fake Software Installers to Infect You with Malware-sensorstechforum

Magnat Malvertising Uses Fake Software Installers to Infect You with Malware

A new malvertising campaign has been detected in the wild. The campaign’s purpose is tricking potential victims into executing fake software installers of popular programs, and eventually download an infostealer, a backdoor and a malicious Chrome extension. The discovery comes…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree