Cyber News - Page 75

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

WP GDPR Compliance Plugin Vulnerabilities Exploited in Attacks

Have you been using the WordPress GDPR plugin called WP GDPR Compliance? Be cautious – the plugin has been hacked. The WP GDPR Compliance plugin enables website owners to include a checkbox to their websites that allows visitors to grant…

CYBER NEWS

KORKERDS Miner Targets Linux, Installs Rootkit to Hide Itself

Aside from the high profit potential, cryptomining malware is favored by threat actors because of its ability to remain undetected on the system. Windows and macOS have both been targeted by cryptominers, and now it appears that Linux has been…

CYBER NEWS

CVE-2018-15961: Adobe ColdFusion Vulnerability Exploited By Hackers

Computer hackers have been found to use the Adobe ColdFusion vulnerability which is tracked in the CVE-2018-15961 advisory. This is a known exploit which continues to be widely adopted by various criminal collectives. Targets all over the world have been…

CYBER NEWS

WordPress Bug Endangers WooCommerce Shop Owners

Online merchants using WordPress as a platform can become victims of a new remote code execution flaw. A new security report reveals that the bug can interact with the WooCommerce plugin, as a result the criminals can overtake the shops.…

CYBER NEWS

Bcmupnp_Hunter Botnet Set Against IoT Devices: 100.000 Are Already Infected

Security researchers the BCMUPnP_Hunter botnet which appears to be specifically targeted against IoT devices. It targets a five-year old vulnerability which appears to be left unpatched by many devices. Since is launch it has since infected about 100,000 IoT devices.…

CYBER NEWS

Side-channel Attacks Found to Affect GPU Cards

A new security report shows that GPU cards are vulnerable to new side-channel attacks. These exploits target both individual end-users that use them in day-to-day activities and clusters that rely on GPUs for distributed computing. GPU Cards Follow CPUs By…

CYBER NEWS

Here Are the Top 3 Privacy Infringing Digital Conglomerates

Just earlier this year, the EU passed GDPR, which established legal ramifications for companies that didn’t adhere to specified standards of privacy. But while GDPR certainly gives consumers more power and choice over how they want to share their data,…

CYBER NEWS

Evernote Vulnerability Abused To Steal Files From Victim Users

A new Evernote vulnerability was recently announced which has been found to allow hackers to hijack files from the victims. It is a cross-site scripting bug (XSS) which also gives the operators the ability to execute arbitrary commands. While a…

CYBER NEWS

HSBC Bank Data Breach Exposed Customers’ Bank Accounts

The HSBC bank has been affected by a data breach, as a result of which some of its US customers’ bank accounts were hacked. The incident took place in October. It appears that hackers may have accessed sensitive information such…

CYBER NEWS

Google, Microsoft Bugs Top the 20 Most Prevalent Enterprise Vulnerabilities

Cybersecurity firm Tenable just released their Vulnerability Intelligence Report which outlines the most prevalent vulnerabilities in terms of enterprise security. Apparently, Microsoft and Google’s software products are at the top of the list of security flaws that disrupt entire enterprise…

CYBER NEWS

Apple’s T2 Chip Prevents Linux from Booting on Latest Mac Hardware

Linux users have complained about experiencing issues when attempting to get their wanted distribution to install on the latest Mac machines. The reason for these troubles is believed to be the T2 chip. More about the T2 Chip. What Does…

CYBER NEWS

Self-Encrypting SSDs Contain Multiple Vulnerabilities, Researchers Find

Security researchers have just discovered several vulnerabilities in some SSDs that could allow a threat actor to bypass the disk encryption feature and access local data. To do that, the attacker doesn’t need to know the user’s disk encryption password.…

CYBER NEWS

CVE-2018-16986: BLEEDINGBIT Vulnerability Exposes Millions of Bluetooth LE Devices

A team of security researchers announced the discovery of the BLEEDINGBIT vulnerability which practically makes millions of Bluetooth devices easy to hack. The issue here is related to two weaknesses demonstrated by the Bluetooth Low Energy (BLE) chips made by…

CYBER NEWS
hacking-ransomware-security-risks-law-firm

Hacking, Ransomware, and Security Risks at Your Law Firm

Earlier this year, the City of Atlanta’s entire judicial system was hit hard when a ransomware attack affected the city’s computer systems. Ransomware is a type of malware that takes over core systems, demanding payment for their recovery. Over one-third…

CYBER NEWS

CVE-2018-5407: Portsmash Side-channel Vulnerability Is a New CPU Bug

Another serious issue has been found targeting modern CPUs — the Portsmash Side-channel Vulnerability which is similar to previous cases like Meltdown. By exploiting this bug hackers can hijack information from processes that are running in the same core. CVE-2018-5407:…

CYBER NEWS

Facebook Private Messages for Sale After 81,000 Accounts Were Hacked

Have you ever feared that your private Facebook messages could fall into the hands of hackers? It turns out that these fears are complete justified, judging by the recent events regarding 81,000 Facebook accounts. Apparently, hackers have compromised and published…

CYBER NEWS

Kraken Ransomware and Fallout Exploit Kit Used In Large-Scale Attacks

The Kraken ransomware is one of the latest virus threats that are being used by hacker groups against victims worldwide. It appears that the majority of them are caused through the Fallout Exploit Kit which was previously used for GandCrab…

CYBER NEWS

5 Potentially Unwanted Programs Harming Your Mac

The macOS operating system is indeed vulnerable to various online threats. There are a number of viruses and Trojans, ransomware and cryptomining malware, and PUPs and adware targeting Macs. In this article, we are going to highlight the danger of…

CYBER NEWS

Top 5 Most Destructive macOS Malware Pieces

Apple’s macOS, just like Microsoft’s Windows operating system, has been targeted by various forms of malware such as viruses, Trojans and backdoors, worms, ransomware, adware, browser hijackers and tech support scams. Below you will find a selection of the most…

CYBER NEWS

1-800-772-1213 Social Security Administration Scam – Beware

A new warning was just issued by the Federal Trade Commission regarding a scam that involves the Social Security Administration. Apparently, scammers are spoofing the administration’s customer service number – 1-800-772-1213. So, if you are getting a call from the…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree