Cyber News - Page 37

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

NetWalker Ransomware Hackers Demand $4.5 Million from Equinix

Ransomware actors are getting greedier, and another proof for that statement is the latest ransom demanded by the Netwalker group. The most recent high profile attack carried out by Netwalker ransomware is against Equinix, where clients’ data was encrypted. NetWalker…

CYBER NEWS

Lifeline Program Phones for Low-Income Citizens Overrun By Malware

Low-income users who have obtained a phone from the government-funded Lifeline program have reported that their devices have been overrun by malware. It appears that the issued phones have been known to push intrusive pop-up ads which are often categorized…

CYBER NEWS

CVE-2020-8758: Intel Active Management Technology Vulnerable to Privilege Escalation

Computer security researchers discovered a major vulnerability in the Intel Active Management technology allowing hackers to gain privilege escalation. This is a feature that is used to carry out remote control access to machines. This issue has recently been patched…

CYBER NEWS

Microsoft Outlook Credentials Hijacked Via Phishing Campaign

Microsoft Outlook credentials are being actively hijacked from users that have fallen for a dangerous active phishing campaign. The hackers behind it are using advanced elements such as overlay screens and policies in order to manipulate the victims into typing…

CYBER NEWS

Custom Windows 10 Themes Can Be Abused To Steal User Credentials

A security researcher has discovered that Windows 10 themes can be used to steal users’ data using a technique called pass-the-hash. This is possible to a loophole found in the operating system that is used to allow the loading of…

CYBER NEWS

CVE-2017-0213: Iranian Hackers Target Insecure RDP Servers With Dharma Ransomware

Computer security experts have discovered that a previously unknown hacking group from Iran are using the CVE-2017-0213 exploit to target RDP servers and implant Dharma ransomware samples. This is one of the most popular virus family and numerous strains of…

CYBER NEWS

Google Drive Vulnerability Could Lead to Downloading Malware

A security researcher recently discovered and reported a Google Drive vulnerability which could lead to malware attacks. The bug is unpatched and could allow threat actors to spread malicious files masqueraded as legitimate documents or images. Further, this could then…

CYBER NEWS

University of Utah Attacked by Ransomware, Paid $457,059

Another case of an organization paying ransom to cybercriminals has been registered. The University of Utah in the United States just revealed that it paid a ransom in the amount of $457,059. The reason for the payment is that cybercriminals…

CYBER NEWS

Microsoft Defender Can No Longer Be Disabled via the Registry

Microsoft Defender, the security suite which guards the Windows operating system has received an important update which will prevent software and programs to disable it via the Windows Registry. To this date this functionality was present in the application’s core…

CYBER NEWS

CVE-2020-1530: Microsoft Releases Emergency Security Updates

Have you noticed an out-of-band security update on your Windows? The patch is an emergency update which fixes privilege escalation vulnerabilities (CVE-2020-1530, CVE-2020-1537) that affect the Windows Remote Access service in Windows 8.1 and Windows Server 2012 R2 (KB4578013). CVE-2020-1530,…

CYBER NEWS

BLINDINGCAN Malware Revealed To Be The Latest Weapon of North Korea

USA Government agencies have revealed a new virus originating from North Korea called the BLINDINGCAN malware which is categorized as a backdoor Trojan. The American authorities have discovered it in an Internet campaign which was captured by the Cybersecurity and…

CYBER NEWS

500 Government, Enterprise Servers Attacked by FritzFrog Botnet

Security researchers recently discovered a sophisticated P2P (peer-to-peer) botnet that has carried out attacks against at least 500 government and enterpise SSH servers throughout 2020. Dubbed FritzFrog, the botnet was detected by Guardicore Labs in January. Apparently, the botnet has…

CYBER NEWS

HTML Smuggling Intrusion Technique Used in Duri Attack Campaigns

The Duri attack campaign which has been launched by an unknown hacking group has revealed that cybercriminals have devised a new intrusion technique – HTML smuggling. It allows hackers to distribute dangerous payloads by utilizing detection evasion by security features.…

CYBER NEWS

TeamTNT Cryptomining Operation Steals AWS Credentials

A newly added feature in a previously known cryptomining operation is targeting AWS credentials, according to a report by security firm Cado Security. The malware group behind this new campaign is known as TeamTNT, a cybercrime group which has been…

CYBER NEWS

EmoCrash: Emotet Killswitch and Exploit Prevents Malware from Spreading

Computer security researchers have created an exploit and subsequently a killswitch (dubbed EmoCrash) to prevent the Emotet malware from spreading. This is one of the most common and dangerous virus infections as they are being spread via botnet networks of…

CYBER NEWS

CVE-2020-1464: Microsoft Didn’t Patch Zero-Day for 2 Years

The CVE-2020-1464 vulnerability was part of the 120 security flaws addressed in August’s Patch Tuesday. This vulnerability particularly stands out as it was actively expoited in malicious attacks for at least two years before Microsoft fixed it. What Is CVE-2020-1464?…

CYBER NEWS

Drovorub Linux Malware Used For Espionage Purposes by Russian Hackers

A dangerous Linux malware called Drovorub has been recently discovered to be an espionage tool used by Russian hackers in attack campaigns. Recent news about it reveals that the scope of the intrusions might be particularly high-impact. Details about it…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree