Cyber News - Page 37

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

CVE-2018-14558: Ttint IoT Trojan Attacks Via Previously Unknown Flaws

An unknown hacking group is leveraging a previously-unknown malware called Ttint which is categorized as an IoT-specific Trojan. What we know is that the hacker developers are using two zero-day vulnerabilities to intrude onto the target devices. The security analysis…

CYBER NEWS

UK Security Experts Discover Huawei Flaw of National Significance

A UK government report indicates a flaw of national significance in Chinese company Huawei. The Huawei Cyber Security Evaluation Centre (HCSEC) was set up by the UK government and the tech company to evaluate equipment meant for UK networks. HCSEC…

CYBER NEWS

GitHub Adds Code Scanning Feature to Recognize Security Flaws

GitHub is getting a new feature that will inform the platform’s users about security flaws in their code. The feature is called Code Scanning, and it is available for both free and paid user accounts. The feature was first announced…

CYBER NEWS

OldGremlin Hackers Conduct Ransomware Attacks Against Russian Companies

Security researchers detected a dangerous and widespread attack against companies in Russia, the hacking group behind is known as OldGremlin. The targets are prolific companies in different sectors, and the hackers appear to be using different ransomware and related malware…

CYBER NEWS

Microsoft Bing Server Exposed Sensitive Search and Location Data

Microsoft has been pushing Windows users towards its Edge Browser and Bing search engine. Unfortunately, a new security report reveals that a back-end server associated with Bing has exposed sensitive data belonging to users of the mobile application. Bing Associated…

CYBER NEWS

New Bug in Firefox for Android Could Be Exploited with Zero Interaction via WiFi

A new vulnerability in Mozilla Firefox for Android was just discovered. The vulnerability was made public by security researcher Lukas Stefanko who disclosed it in a Twitter alert. The vulnerability is high-risk and it can lead to remote code execution.…

CYBER NEWS

MrbMiner Malware Infects MSSQL Databases in Worldwide Attack

A new dangerous attack campaign has been detected by security researchers involved in the distribution of the MrbMiner malware which is programmed to infect MSSQL databases. They are part of enterprise and company sites and are used to contain sensitive…

CYBER NEWS

Bluetooth Low Energy Spoofing Attack Endangers Billions of Devices

Here comes a new major, massive vulnerability that affects billions of devices, including smartphones, tablets, laptops, and IoT appliances. Dubbed BLESA, OR Bluetooth Low Energy Spoofing Attack, the flaw affects devices that run the Bluetooth Low Energy protocol, shortly known…

CYBER NEWS

‘Salfram’ Email Messages Malware Campaign Targets Business in Ongoing Attack

Computer security researchers have detected a new massive SPAM campaign which has received the code name ‘Salfram’ and targets primarily business users and companies. Several hacking groups are behind the attacks and depending on the current configuration various malware are…

CYBER NEWS

KB4576754, or Yet Another Update Pushing Edge to Windows Users

Microsoft is not giving up on pushing its Edge browser to Windows users, and another mandatory update proves that. Despite adopting the Chromium engine, the company doesn’t want you to use Chrome or any other browser, and just released a…

CYBER NEWS

NetWalker Ransomware Hackers Demand $4.5 Million from Equinix

Ransomware actors are getting greedier, and another proof for that statement is the latest ransom demanded by the Netwalker group. The most recent high profile attack carried out by Netwalker ransomware is against Equinix, where clients’ data was encrypted. NetWalker…

CYBER NEWS

Lifeline Program Phones for Low-Income Citizens Overrun By Malware

Low-income users who have obtained a phone from the government-funded Lifeline program have reported that their devices have been overrun by malware. It appears that the issued phones have been known to push intrusive pop-up ads which are often categorized…

CYBER NEWS

CVE-2020-8758: Intel Active Management Technology Vulnerable to Privilege Escalation

Computer security researchers discovered a major vulnerability in the Intel Active Management technology allowing hackers to gain privilege escalation. This is a feature that is used to carry out remote control access to machines. This issue has recently been patched…

CYBER NEWS

Microsoft Outlook Credentials Hijacked Via Phishing Campaign

Microsoft Outlook credentials are being actively hijacked from users that have fallen for a dangerous active phishing campaign. The hackers behind it are using advanced elements such as overlay screens and policies in order to manipulate the victims into typing…

CYBER NEWS

Custom Windows 10 Themes Can Be Abused To Steal User Credentials

A security researcher has discovered that Windows 10 themes can be used to steal users’ data using a technique called pass-the-hash. This is possible to a loophole found in the operating system that is used to allow the loading of…

CYBER NEWS

CVE-2017-0213: Iranian Hackers Target Insecure RDP Servers With Dharma Ransomware

Computer security experts have discovered that a previously unknown hacking group from Iran are using the CVE-2017-0213 exploit to target RDP servers and implant Dharma ransomware samples. This is one of the most popular virus family and numerous strains of…

CYBER NEWS

Google Drive Vulnerability Could Lead to Downloading Malware

A security researcher recently discovered and reported a Google Drive vulnerability which could lead to malware attacks. The bug is unpatched and could allow threat actors to spread malicious files masqueraded as legitimate documents or images. Further, this could then…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree