Cyber News - Page 57

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Instagram Flaw in Password Recovery Mechanism Grants Full Access

Security researcher Laxman Muthiyah discovered a critical vulnerability that could have allowed remote attackers to reset the password of Instagram accounts, thus obtaining full access to the compromised accounts. The vulnerability resided in the password recovery mechanism in the mobile…

CYBER NEWS

KB4507456 Security-Only Update Bundled with Telemetry

It’s been some time since we last talked about Windows-related telemetry. However, this is now changing with the latest Patch Tuesday for July 2019, which includes a bonus for Windows 7 users. According to “hawk-eyed” users, a “security-only” Windows 7…

CYBER NEWS

Matrix Alert: Agent Smith Malware Silently Infects 25M Android Devices

Security researchers just came across a new type of mobile malware “that has quietly infected around 25 million devices” without users being aware of the infection. The malware is targeting Android users and is called Agent Smith after the Matrix…

CYBER NEWS

eCh0raix Ransomware Infects QNAP Nas Devices In Ongoing Attacks

Several security reports indicate that a new dangerous virus called the eCh0raix ransomware is being used against QNAP Nas device owners. It appears that it is being sent in a worldwide campaigns using preset hacking configuration options and automated toolkits.…

CYBER NEWS

RIG Exploit Kit Currently Spreading ERIS Ransomware

RIG exploit kit has been detected to spread ERIS ransomware. This means that the infection vector is based simply on visiting a compromised website which downloads the malicious payload on victims’ computers. It is curious to mention that the same…

CYBER NEWS

CVE-2019-13450: Dangerous Zero-Day in Mac Zoom Client

Jonathan Leitschuh just reported “a vulnerability in the Mac Zoom Client” that allows “any malicious website to enable your camera without your permission”. The issue known under CVE-2019-13450 potentially puts at risk up to 750,000 companies around the world that…

CYBER NEWS

Updates for Samsung Fake Android App Installed 10 Million Times

Security researcher Aleksejs Kuprins of CSIS Security Group recently discovered an Android app that allegedly provides firmware updates for Samsung users. The app is known as Updates for Samsung – Android Update Versions, and it has more than 10 million…

CYBER NEWS

17-Year Old Bug in Firefox Allows Local Files Theft Attacks

Security researcher Barak Tawily recently came across a 17-year-old security vulnerability Mozilla Firefox’s latest version. It turns out that the widely popular browser is vulnerable to local files theft attack on any operating system. Vulnerability in Firefox Allows Local Files…

CYBER NEWS

Godlua Backdoor Uses CVE-2019-3396 to Target Linux Users

There’s a new piece of advanced backdoor malware that can target both Linux and Windows systems in a secure, previously unseen communication. The backdoor has been dubbed Godlua, as it is Lua-based and “the Lua byte-code file loaded by this…

CYBER NEWS

Facebook Exploited to Spread Remote Access Trojans for Years

According to a brand new research, Facebook has been leveraged for years to spread Trojans in the likes of Houdini, Remcos, and Spynote. All of the threats allow remote access and could spy on users’ activities. Check Point researchers revealed…

CYBER NEWS

Ryuk Ransomware Hits Georgia’s Court Systems

Ryuk ransomware has attacked Georgia’s court system. This appears to be the fourth attack against government institutions in the past couple of months. Officials confirmed that at least some parts of the court system’s network were taken offline due to…

CYBER NEWS
gdpr-real-impact

Effective or Not? The Real Impact of GDPR

Just a little over a year ago, companies all over the world were still scrambling to update their flows and documents so that the onset of GDPR wouldn’t catch them (completely) unprepared. The risk of huge fines – up to…

CYBER NEWS

Top 5 Most Dangerous Microsoft Office Vulnerabilities

Let’s see why hackers love exploiting specific Microsoft Office vulnerabilities. Below you will find some of the most dangerous vulnerabilities discovered in MS Office in recent years. Hackers have been exploiting Microsoft Office vulnerabilities to spread various forms of malware.…

CYBER NEWS

TechNet Search Virus Mac – Remove It

TechNet Search or TechNetSearch is a suspicious, unwanted program that is targeting Mac users. TechNet Search is designed to first open a dubious website and only then it will display search results to its users. This makes it a browser…

CYBER NEWS

Online Video Converter Compromised to Deliver Ransomware

Another malvertising campaign delivering ransomware was detected. More specifically, ad servers utilized by a popular YouTube to MP3 conversion website ((onlinevideoconverter[.]com) have been compromised to spread an exploit kit known as GreenFlash Sundown and Seon ransomware. Malvertising attacks typically involve…

CYBER NEWS

Silex IoT Malware Operator Bricks Devices and Plans Future Attacks

Silex is a new strain of very dangerous IoT malware that was just detected by security researchers. The malware is similar to BrickerBot which attacked more than 60,000 Internet devices in several states in India. Related: [wplinkpreview url=”https://sensorstechforum.com/brickerbot-malware-attack-india/”] BrickerBot Malware…

CYBER NEWS

What Can Happen If Your IP Address Gets Leaked?

With the stupendous growth of the internet and its related activities, internet security has become a serious concern. When we are surfing the internet, checking social media accounts, or chatting with friends, the rest of the world can identify us…

CYBER NEWS
national-security-strategy-best-practices

The Importance of a National Security Strategy: Best Practices

The physical protection of key assets in cyberspace collectively improves overall security for the entire public and private network infrastructure and is crucial to a national security strategy. Private and government organizations are required to use the guidelines and best…

CYBER NEWS

macOS Catalina: New Security and Privacy Features

Apple recently revealed its new operating system – macOS Catalina – during the annual Worldwide Developers Conference. Since we usually focus on the cybersecurity side of things, let’s see what the latest OS update brings in terms of privacy and…

CYBER NEWS

OSX/Linker Malware Leverages Known Gatekeeper Vulnerability

New Mac malware is being developed targeting a recently discovered macOS Gatekeeper security flaw. The malware in question is known as OSX/Linker, and it has been analyzed by Intego security researcher Joshua Long. OSX/Linker Malware: what we know so far…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree