Cyber News - Page 73

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Microsoft Violates GDPR by Covertly Collecting MS Office Data

Would you be surprised to find out that Microsoft is not complying with the data collection rules established by the GDPR? More specifically, at fault of breaking the EU regulations is the telemetry data collection mechanism utilized by Microsoft Office,…

CYBER NEWS

Sites Infected with Magecart Malware Reinfected Multiple Times

You may think that you’re safe after you’ve removed the malware from your infected online Magento store. However, it turns out that the infamous Magecart malware, known for harvesting credit card details from checkout forms, re-infects even after clean-up. The…

CYBER NEWS

CVE-2018-8589 Zero-Day Affected Windows Win32k Component

Microsoft’s November 2018 Patch Tuesday’s has rolled out, and it contains one particular zero-day vulnerability that needs special attention. CVE-2018-8589 was reported to Microsoft by Kaspersky Lab in October, and was quickly confirmed and assigned a CVE number. The CVE-2018-8589…

CYBER NEWS

New Facebook Bug May Expose Private User Data

Security experts discovered a new Facebook bug that allow malicious users to hijack sensitive user data from the social network. According to the proof-of-concept demonstrations the problem allows hackers to exploit a weakness in the service via browser requests. The…

CYBER NEWS

Steam Vulnerability Allowed Malicious Operators to Gain License Keys

A security researcher discovered a dangerous Valve vulnerability allowing malicious users to reveal the license keys for the available content on the store. This means that every computer game or software can be acquired by leveraging it. The expert has…

CYBER NEWS

WP GDPR Compliance Plugin Vulnerabilities Exploited in Attacks

Have you been using the WordPress GDPR plugin called WP GDPR Compliance? Be cautious – the plugin has been hacked. The WP GDPR Compliance plugin enables website owners to include a checkbox to their websites that allows visitors to grant…

CYBER NEWS

KORKERDS Miner Targets Linux, Installs Rootkit to Hide Itself

Aside from the high profit potential, cryptomining malware is favored by threat actors because of its ability to remain undetected on the system. Windows and macOS have both been targeted by cryptominers, and now it appears that Linux has been…

CYBER NEWS

CVE-2018-15961: Adobe ColdFusion Vulnerability Exploited By Hackers

Computer hackers have been found to use the Adobe ColdFusion vulnerability which is tracked in the CVE-2018-15961 advisory. This is a known exploit which continues to be widely adopted by various criminal collectives. Targets all over the world have been…

CYBER NEWS

WordPress Bug Endangers WooCommerce Shop Owners

Online merchants using WordPress as a platform can become victims of a new remote code execution flaw. A new security report reveals that the bug can interact with the WooCommerce plugin, as a result the criminals can overtake the shops.…

CYBER NEWS

Bcmupnp_Hunter Botnet Set Against IoT Devices: 100.000 Are Already Infected

Security researchers the BCMUPnP_Hunter botnet which appears to be specifically targeted against IoT devices. It targets a five-year old vulnerability which appears to be left unpatched by many devices. Since is launch it has since infected about 100,000 IoT devices.…

CYBER NEWS

Side-channel Attacks Found to Affect GPU Cards

A new security report shows that GPU cards are vulnerable to new side-channel attacks. These exploits target both individual end-users that use them in day-to-day activities and clusters that rely on GPUs for distributed computing. GPU Cards Follow CPUs By…

CYBER NEWS

Here Are the Top 3 Privacy Infringing Digital Conglomerates

Just earlier this year, the EU passed GDPR, which established legal ramifications for companies that didn’t adhere to specified standards of privacy. But while GDPR certainly gives consumers more power and choice over how they want to share their data,…

CYBER NEWS

Evernote Vulnerability Abused To Steal Files From Victim Users

A new Evernote vulnerability was recently announced which has been found to allow hackers to hijack files from the victims. It is a cross-site scripting bug (XSS) which also gives the operators the ability to execute arbitrary commands. While a…

CYBER NEWS

HSBC Bank Data Breach Exposed Customers’ Bank Accounts

The HSBC bank has been affected by a data breach, as a result of which some of its US customers’ bank accounts were hacked. The incident took place in October. It appears that hackers may have accessed sensitive information such…

CYBER NEWS

Google, Microsoft Bugs Top the 20 Most Prevalent Enterprise Vulnerabilities

Cybersecurity firm Tenable just released their Vulnerability Intelligence Report which outlines the most prevalent vulnerabilities in terms of enterprise security. Apparently, Microsoft and Google’s software products are at the top of the list of security flaws that disrupt entire enterprise…

CYBER NEWS

Apple’s T2 Chip Prevents Linux from Booting on Latest Mac Hardware

Linux users have complained about experiencing issues when attempting to get their wanted distribution to install on the latest Mac machines. The reason for these troubles is believed to be the T2 chip. More about the T2 Chip. What Does…

CYBER NEWS

Self-Encrypting SSDs Contain Multiple Vulnerabilities, Researchers Find

Security researchers have just discovered several vulnerabilities in some SSDs that could allow a threat actor to bypass the disk encryption feature and access local data. To do that, the attacker doesn’t need to know the user’s disk encryption password.…

CYBER NEWS

CVE-2018-16986: BLEEDINGBIT Vulnerability Exposes Millions of Bluetooth LE Devices

A team of security researchers announced the discovery of the BLEEDINGBIT vulnerability which practically makes millions of Bluetooth devices easy to hack. The issue here is related to two weaknesses demonstrated by the Bluetooth Low Energy (BLE) chips made by…

CYBER NEWS
hacking-ransomware-security-risks-law-firm

Hacking, Ransomware, and Security Risks at Your Law Firm

Earlier this year, the City of Atlanta’s entire judicial system was hit hard when a ransomware attack affected the city’s computer systems. Ransomware is a type of malware that takes over core systems, demanding payment for their recovery. Over one-third…

CYBER NEWS

CVE-2018-5407: Portsmash Side-channel Vulnerability Is a New CPU Bug

Another serious issue has been found targeting modern CPUs — the Portsmash Side-channel Vulnerability which is similar to previous cases like Meltdown. By exploiting this bug hackers can hijack information from processes that are running in the same core. CVE-2018-5407:…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree