Cyber News - Page 54

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Microsoft Patches CVE-2019-1214, CVE-2019-1215 Zero-Day Flaws

Two zero-day vulnerabilities were fixed in Microsoft’s September 2019 Patch Tuesday – CVE-2019-1214 and CVE-2019-1215. In total, 80 vulnerabilities were fixes of which 17 were listed as critical, and the rest – important. More about CVE-2019-1214 and CVE-2019-1215 Apparently, both…

CYBER NEWS

Windows Update Abused To Deliver The Stealth Falcon Malware

The Windows Update mechanisms through the Windows Background Intelligent Transfer Service (BITS) has been found to deliver the dangerous Stealth Falcon malware. This is the default any of applying updates to the Microsoft Windows operating system. A complex strategy is…

CYBER NEWS

NetCAT Attack: Intel Server-Grade CPUs Exploited to Leak Sensitive Data

Cybersecurity researchers have outlined a new type of attack involving Intel server-grade processors since 2012. The attack is based on a vulnerability named NetCAT (Network Cache Attack). The vulnerability could allow sniffing data by mounting a side-channel attack over the…

CYBER NEWS

Period-Tracking Apps Are Sharing Your Sex Life with Facebook

How much exactly does Facebook know about us? No one would argue the pervasiveness of the social network and its impact on our lives. But do we fully comprehend the amounts of personal, highly sensitive information that Facebook gets hold…

CYBER NEWS

Patch Gap in Chrome Could Have Been Weaponized by Attackers

Patch gapping is a serious issue that puts a system at risk of exploits. The problem stems from a gap in time before a patch of a security vulnerability in an open-source software is shipped to users. The vulnerability may…

CYBER NEWS

1 Million Imperial & Dabman IoT Radio Devices Vulnerable to Attacks

Dangerous vulnerabilities were recently discovered in Telestar Digital GmbH IoT radio devices. The flaws could allow remote attackers to hijack vulnerable systems. The vulnerabilities were discovered by Vulnerability Laboratory. Some of them are already assigned CVE numbers – CVE-2019-13473 and…

CYBER NEWS

Wikipedia Suffers a Major DDoS Attack

Wikipedia has suffered a major DDoS attack. The attack took place during the weekend. According to Wikipedia’s official statement released on September 7, “Wikipedia was hit with a malicious attack that has taken it offline in several countries for intermittent…

CYBER NEWS

CVE-2019-13224, Other Critical Flaws in PHP – Patch Now

The latest versions of PHP were recently released (PHP version 7.3.9, 7.2.22 and 7.1.32 across several branches) to address several highly critical vulnerabilities in its core and bundled libraries. The most dangerous of these vulnerabilities are the ones that could…

CYBER NEWS

Facebook Patches Critical Exploits in Its HHVM Server Software

Facebook has announced that they have updated their HHVM server software which removes the possibility of it to be exploited. The company announced that two critical bugs were fund in it. The vulnerabilities allow the hackers to obtain sensitive data…

CYBER NEWS

Researchers Disclose Unpatched Android Zero-Day

A new zero-day vulnerability has been discovered in Android. If exploited, the flaw could give a local attacker escalated privileges on the compromised device. According to TrendMicro’s Zero Day Initiative researchers Lance Jiang and Moony Li, the flaw is located…

CYBER NEWS
Domen Hacking Toolkit

Domen Hacking Toolkit Used in Worldwide Malware Campaigns

The Domen Hacking Toolkit is a dangerous weapon in the hands of numerous criminal collectives which is actively being used in global attack campaigns. It is used as a framework through which malware samples can be launched through social engineering…

CYBER NEWS

Zerodium Payout for Android Exploits Jumps to $2.5M, iOS Price Drops

Zerodium, a “leading exploit acquisition platform for premium zero-days and advanced cybersecurity research”, has updated its price list. Apparently, Android exploits are now more expensive than iOS exploits, for the first time in history. Zerodium is now paying much more…

CYBER NEWS

Supermicro BMCs Expose Corporate Networks to Remote Attacks

Myriad vulnerabilities were discovered in the so-called baseboard management controllers (BMCs) of Supermicro servers. The flaws could be exploited in remote attacks and could grant access to corporate networks. Eclypsium researchers dubbed the vulnerabilities USBAnywhere. Image: Eclypsium USBAnywhere Vulnerabilities Explained…

CYBER NEWS

School Year 2019: Malware Hiding in Essays and Textbooks

Malware authors are always finding ways to be up-to-date with current events in their distribution campaigns. According to a brand new research by Kaspersky Lab, the latest wave of malware is hiding in school- and student-related content posted for free…

CYBER NEWS

Hackers Use iOS Exploit Chains Against iPhone Users

Several privilege escalation exploit chains were discovered in iOS devices by Google’s Threat Analysis Group (TAG) and Project Zero teams. The vulnerabilities were actively used by threat actors who also used compromised websites to carry out watering hole attacks against…

CYBER NEWS

TrickBot Updated And Used Against Mobile Carrier Users

The well-known TrickBot malware has been updated with a new version and features so that it is used by a hacking group against mobile carrier users. The new variants are confirmed to be used against users of T-Mobile, Sprint, Verizon…

CYBER NEWS

Popular WordPess Plugins Used To Hack Blogs: Update Now!

Computer researchers uncovered several popular WordPress plugins which are actively abused in order to hack sites. This is due to a weakness found in them allowing for malicious code to be injected. Since the discovery was made they have been…

CYBER NEWS

3 Weirdest Recent Online Scams and How to Avoid Them

Phishing, ransomware, emails from a Nigerian prince – all these scams are quite well-known. It’s true that some Internet users still trust them, but the majority do not. However, scammers are not easily defeated. Daily, they create new ways of…

CYBER NEWS

Lyceum Hackers Conduct Targeted Attacks Against The Middle East

The Lyceum hackers are a criminal group that was found to be be coordinating attacks against high-profile targets in the Middle East. The activities of the group were under investigation by security experts and released to the public. From the…

CYBER NEWS
Retadup worm

Retadup Worm Responsible for STOP Ransomware Infections Is Being Shut Down

The Retadup worm is being shut down by computer specialists, this is the malware which is responsible for the large part of the STOP ransomware versions. The worm is primarily spread in Latin America and it has an extensive malware…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree