Cyber News - Page 55

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Researchers Disclose Unpatched Android Zero-Day

A new zero-day vulnerability has been discovered in Android. If exploited, the flaw could give a local attacker escalated privileges on the compromised device. According to TrendMicro’s Zero Day Initiative researchers Lance Jiang and Moony Li, the flaw is located…

CYBER NEWS
Domen Hacking Toolkit

Domen Hacking Toolkit Used in Worldwide Malware Campaigns

The Domen Hacking Toolkit is a dangerous weapon in the hands of numerous criminal collectives which is actively being used in global attack campaigns. It is used as a framework through which malware samples can be launched through social engineering…

CYBER NEWS

Zerodium Payout for Android Exploits Jumps to $2.5M, iOS Price Drops

Zerodium, a “leading exploit acquisition platform for premium zero-days and advanced cybersecurity research”, has updated its price list. Apparently, Android exploits are now more expensive than iOS exploits, for the first time in history. Zerodium is now paying much more…

CYBER NEWS

Supermicro BMCs Expose Corporate Networks to Remote Attacks

Myriad vulnerabilities were discovered in the so-called baseboard management controllers (BMCs) of Supermicro servers. The flaws could be exploited in remote attacks and could grant access to corporate networks. Eclypsium researchers dubbed the vulnerabilities USBAnywhere. Image: Eclypsium USBAnywhere Vulnerabilities Explained…

CYBER NEWS

School Year 2019: Malware Hiding in Essays and Textbooks

Malware authors are always finding ways to be up-to-date with current events in their distribution campaigns. According to a brand new research by Kaspersky Lab, the latest wave of malware is hiding in school- and student-related content posted for free…

CYBER NEWS

Hackers Use iOS Exploit Chains Against iPhone Users

Several privilege escalation exploit chains were discovered in iOS devices by Google’s Threat Analysis Group (TAG) and Project Zero teams. The vulnerabilities were actively used by threat actors who also used compromised websites to carry out watering hole attacks against…

CYBER NEWS

TrickBot Updated And Used Against Mobile Carrier Users

The well-known TrickBot malware has been updated with a new version and features so that it is used by a hacking group against mobile carrier users. The new variants are confirmed to be used against users of T-Mobile, Sprint, Verizon…

CYBER NEWS

Popular WordPess Plugins Used To Hack Blogs: Update Now!

Computer researchers uncovered several popular WordPress plugins which are actively abused in order to hack sites. This is due to a weakness found in them allowing for malicious code to be injected. Since the discovery was made they have been…

CYBER NEWS

3 Weirdest Recent Online Scams and How to Avoid Them

Phishing, ransomware, emails from a Nigerian prince – all these scams are quite well-known. It’s true that some Internet users still trust them, but the majority do not. However, scammers are not easily defeated. Daily, they create new ways of…

CYBER NEWS

Lyceum Hackers Conduct Targeted Attacks Against The Middle East

The Lyceum hackers are a criminal group that was found to be be coordinating attacks against high-profile targets in the Middle East. The activities of the group were under investigation by security experts and released to the public. From the…

CYBER NEWS
Retadup worm

Retadup Worm Responsible for STOP Ransomware Infections Is Being Shut Down

The Retadup worm is being shut down by computer specialists, this is the malware which is responsible for the large part of the STOP ransomware versions. The worm is primarily spread in Latin America and it has an extensive malware…

CYBER NEWS

Key Questions to Ask a Pen Test Provider Before Commissioning Them

Penetration testing has become an essential for businesses looking to maintain a robust cybersecurity posture. But if you are commissioning a test for the first time, then you have the challenge of choosing the right provider. Pen testing is a…

CYBER NEWS

CamScanner Android App Silently Installs Necro Trojan

It appears that one of the most popular Android apps called CamScanner is installing silently the Necro Trojan on victim devices, according to a new security report. It is very possible that the developers have not done it intentionally as…

CYBER NEWS

Windows Users Be Warned, ‘Complete Hack’ Flaw Used in Attacks!

A team of security experts discovered a ‘Complete Control’ weakness in the Windows operating system which can cause a wide variety of dangerous actions. The problem lies within vulnerable that is exploited by the device drivers and operating system allowing…

CYBER NEWS

WS-Discovery Protocol Exposes 630,000 Devices to DDoS Attacks

The Web Services Dynamic Discovery (WS-Discovery) protocol could be exploited to launch large-scale DDoS attacks, security researchers are reporting. What is the WS-Discovery protocol? The WS-Discovery protocol is described as a technical specification that defines a multicast discovery protocol to…

CYBER NEWS

CVE-2019-14378: QEMU Vulnerability Allows Virtual Machine Escape

CVE-2019-14378 is a new vulnerability in QEMU, an open-source hardware virtualization package. QEMU emulates a machine’s processor through dynamic binary translation and provides a set of different hardware and device models for the machine, enabling it to run a variety…

CYBER NEWS
iot-related-risks-business-sector-companies

IoT-Related Risks in the Business Sector (for Companies)

The Internet of Things home security systems can protect all IoT devices from attack. Businesses protect devices such as phones and computers with antiviruses, while the Internet of Things offers protection to appliances like fridges, cars, monitoring devices, and much…

CYBER NEWS

Bolik Trojan Spreads To Intended Targets Via Fake VPN Sites

The Balik Trojan as a dangerous malware threat is being spread onto fake hacker-made sites, in the case of the ongoing attacks they are fake VPN sites. According to the available security reports this is done by using a sophisticated…

CYBER NEWS

VPN Services Attacked By CVE-2019-11510 Vulnerability

The CVE-2019-11510 vulnerability is being used against VPN providers worldwide. The available security reports indicate that a criminal collective is actively seeking to break the security barriers of several providers of VPN services. This is done by exploiting a recent…

CYBER NEWS

Silence Hackers Launch Attacks on Financial Organizations Worldwide

The Silence hackers are a dangerous criminal collective that are confirmed to be Russian-speaking and probably originate from a Slavic country. Their latest attacks are set against numerous financial organizations and institutions across a wide range of areas. The frequency…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree