Cyber News - Page 51

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Microsoft Office for Mac Can’t Disable XLM Macros

There is a serious loophole in Mac security, and it is related to macros. The issue affects the Mac version of Microsoft Office. According to the official advisory, “the Microsoft Office for Mac option “Disable all macros without notification” enables…

CYBER NEWS

TrendMicro Employee Sold Customer Data to Tech Support Scammers

A TrendMicro employee has been stealing consumer information and selling it to tech support scammers. The company made an announcement regarding this security incident, in which in becomes clear that unauthorized disclosure of personal data of some customers has been…

CYBER NEWS

Phishing Campaigns Are Now Using Google Analytics

Phishing has been evolving steadily over the years. As a result, cybercriminals have learned to exploit technical markers such as browser identification, geo-locations and operating system to enable granular targeting. However, these are not the only markers phishers have been…

CYBER NEWS

C&C Server Hosting a Large Stockpile of Malicious Files Discovered

Security researchers recently discovered a new server “hosting a large stockpile of malicious files”. The analysis shows that malicious actors are targeting a number of organizations with the help of a command-and-control server. This server is hosting samples of ransomware…

CYBER NEWS

Top 10 Global Cybersecurity Issues in 2019, with 2020 in Mind

“Cybersecurity is the Biggest Threat to the World Economy, CEOs Say” So reads the July 9 headline of a major news publication on its website just two short months ago. Concerns about internet and network security have been around for…

CYBER NEWS

A Crabby Business: How GandCrab Transformed the Ransomware Model

GandCrab (or just Crab) ransomware definitely changed the rules of the ransomware game. The operators behind the infamous cryptovirus created a very profiting business model which others quickly adopted. For example, let’s have a look at the so-called Sodinokibi ransomware.…

CYBER NEWS

Camgirl Sites Expose Sensitive Information of Users and Sex Workers

Several camgirl websites, operated by Barcelona-based VST Media have been exposed. The exposure of data affects both sex workers and users. The reason for the exposure is an unprotected back-end database. Affected users are mostly based in Span and Europe,…

CYBER NEWS

CVE-2019-13720: Severe Chrome Bug Exploited in the Wild

CVE-2019-13720 is a new vulnerability in Chrome. Google is warning users that this use-after-free vulnerability in the browser’s audio component is currently being exploited in the wild. CVE-2019-13720: some details CVE-2019-13720 was discovered by Kaspersky security researchers Anton Ivanov and…

CYBER NEWS

13 Managed Service Providers Hit by Ransomware in 2019

According to a new Armor report, at least 13 managed service providers (MSPs) have been attacked by ransomware. Due to the nature of an MSP company, attacks on their infrastructure usually have many negative outcomes. A managed service provider manages…

CYBER NEWS

UniCredit Data Breach Affects the Records of 3 Million Clients

The Italian branch of UniCredit just revealed information about a data breach involving the personal records of 3 million clients. This is the third security incident affecting Italy’s top bank in recent years, Reuters reported. UniCredit Data Breach Affects Millions…

CYBER NEWS

What Does the CCPA Actually Mean for Users’ Data Privacy?

California — keeping with its tradition as a groundbreaker in privacy-related legislation in the US — has passed the strictest data privacy law in the nation, the California Consumer Privacy Act (CCPA), which will be enforceable January 1, 2020, onward.…

CYBER NEWS

CVE-2019-17093: Vulnerability in Avast and AVG Antivirus

CVE-2019-17093 is a vulnerability discovered in all editions of Avast and AVG Antivirus programs. The issue could allow an attacker to load malicious DLL files to bypass protection and achieve persistence on compromised systems. It should be noted that exploiting…

CYBER NEWS

17 iOS Apps Infected with Trojan Clicker Lurked in Apple App Store

17 infected apps were discovered in the Apple App Store. The apps contained a Trojan clicker type of malware, which communicated with a known command-and-control server to simulate user interactions. Clicker malware is usually deployed for ad fraud, and so…

CYBER NEWS
HTTP Injector image

Cache Poisoned Denial of Service (CPDoS) Attacks Used Against Content Delivery Networks

Security researchers uncovered a dangerous new hacking mechanisms which allows criminals to launch devastating attacks against content delivery networks. The new attack type is known as CPDoS which stands for “Cache-Poisoned Denial-of-Service “, this is categorized is a type of…

CYBER NEWS

Several High Severity Bugs Fixed in Firefox and Chrome

A bunch of critical security vulnerabilities affect Mozilla Firefox browser. Another high-severity flaw was also discovered in Google Chrome. It appears that all bugs could lead to arbitrary code execution. According to an advisory by MS-ISAC (Multi-State Information Sharing and…

CYBER NEWS

After Effects: The Real Cost of a Cyber Attack

When we think of cybercrimes against businesses, it can be easy only to consider the immediate effect: the data that is stolen by hackers during the breach. However, there is actually far more to think about. Here we take a…

CYBER NEWS

Winnti Hackers Attack Microsoft SQL Servers Via Skip-2.0 Malware

The Skip-2.0 malware is a dangerous threat which is being launched by a hacking group known as Winnti. These hackers are referred to as a mega-collective as several smaller hacking groups use this name to identify themselves. The criminals are…

CYBER NEWS

CVE-2017-11882: Agent Tesla Malware Leverages Phishing Techniques

The Agent Tesla malware is among the most popular tools used by hackers in order to launch global phishing campaigns. The analysis shows that the CVE-2017-11882 vulnerability is being used in combination with malware documents in order to lead to…

CYBER NEWS

CVE-2019-17666: Severe Linux Vulnerability in the rtlwifi Driver

A new serious Wi-Fi vulnerability has been reported by security researchers, this time in Linux. The vulnerability which resides in the rtlwifi driver that mainly supports the Realtek Wi-Fi chips model used in Linux devices, could allow attackers compromise a…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree