Cyber News - Page 79

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Whiplr Messenger Places Uses at Risk with Insecure Account Verification

The Whiplr messenger has been found to utilize an insecure account verification procedure by requesting plain-text usernames and password combinations. This allows malicious users to easily hijack the information using various methods. The Whiplr Messenger Uses an Insecure Account Verification…

CYBER NEWS

Veeam Leaked Over 200 GB of Customer Data, Fortune 500 Companies Affected

A database belonging to Veeam, a data management company, has been leaked online containing sensitive customer records. A deeper look into its contents reveals that many of its customers are Fortune 500 companies which signals a very serious security risk.…

CYBER NEWS

CVE-2018-8440 Zero-Day Fixed in September 2018 Patch Tuesday

September Patch Tuesday 2018 has been released, fixing a total of 62 security vulnerabilities. The fixes include a recently discovered zero-day bug which was exploited in the wild. This vulnerability has been given the CVE-2018-8440 identifier. More about CVE-2018-8440 The…

CYBER NEWS
Windows virus

WordPress Site Owners Targeted by Global Phishing Scam

A recent report indicates that WordPress site administrators are becoming target to a global phishing scam. It is being orchestrated by an unknown criminal collective, its main goal seems to be the acquisition of sensitive information by coercing the targets…

CYBER NEWS

PowerPool Hackers Exploit Newly Identified Windows Zero-Day Vulnerability

A new Microsoft Windows zero-day vulnerability known as ALPC LPE has been exploited in the wild. The dangerous fact is that the hacking attacks happened soon after the information was published online. Users from all over the world are affected.…

CYBER NEWS

Tor Browser Zero-Day Vulnerability Revealed: Patch Immediately!

Zerodium recently reported the discovery of a new zero-day exploit in Tor browser. The same exploit vendor earlier this year offered $1 million for submitting such an exploit for Tor browser. The new Tor zero-day could reveal the identity of…

CYBER NEWS

Latest Luckymouse Trojan Set Against Government Institutions

Security experts report that the LuckyMouse Hacking group has devised a new malicious threat which uses a highly advanced infiltration behavior pattern. This new LuckyMouse Trojan has the capability to infect high-profile networks and is considered a critical infection. Luckymouse…

CYBER NEWS

The Adware Doctor Case Highlights the Lack of Safety in Mac App Store

If you’re an Apple fan or owner of their devices, perhaps you heard. The very popular anti-malware app for Mac called Adware Doctor was removed from the Mac App Store. The reason? The app was collecting browsing histories, as well…

CYBER NEWS

iOS Apps Packed with Location Data Monetization Code

Security researchers have made an aggravating discovery that concerns an increasing number of iOS apps, which have been used to silently and secretly collect location histories from tens of millions of Apple devices. To do so, the apps used packaged…

CYBER NEWS
MIcrosoft Office CVE-2017-0199 Exploit

Fallout EK Spreads GandCrab, Leverages CVE-2018-4878, CVE-2018-8174

New security reports have landed indicating that the infamous GandCrab ransomware is currently being distributed by a new exploit kit known as Fallout. The Fallout EK is pushing the ransomware alongside downloader Trojans and potentially unwanted programs. The EK was…

CYBER NEWS

Apple to Release an Online Tool for Police to Request User Data

Apparently, Apple is planning to develop an online tool especially for police to formally request data about its users and to assemble a team to train police about what data can and cannot be obtained from the company, Reuters recently…

CYBER NEWS

macOS Exploit Installs Malware Remotely via Custom URL Handlers in Safari

A brand new macOS exploit has been revealed by researchers. The exploit would allow remote installation of malware on the targeted system with the help of custom URL handlers in Safari. The researchers proved the attack in a demo. It…

CYBER NEWS

MEGA Chrome Extension Hacked & User Passwords Stolen, Uninstall it ASAP!

The Official MEGA Chrome Extension has been hacked according to security reports, until the issue has been resolved all users should uninstall it immediately. The version offered on The Chrome Web Store has been replaced by a malicious instance that…

CYBER NEWS

Hakai Iot Botnet Wages War Against D-Link and Huawei Routers

The Hakai IoT botnet is a dangerous threat that is being distributed in a global attack campaign targeting home routers of all popular brands. It is built on the foundations of an older threat featuring heavy upgrades. Hakai Iot Botnet…

CYBER NEWS

Even Google Can’t Distinguish Fake Tech Support from Legitimate

Tech-support scams have been around for several years, and during that time, they have definitely improved, becoming more difficult to detect or recognize. Unfortunately, this is not only true for online users but also for Google. It turns out that…

CYBER NEWS

Family Orbit Spyware App Hacked, 281 Gigabytes’ of Kids’ Photos Exposed

Motherboard recently reported that a company [Family Orbit] that is selling spyware to parents to keep track of their children has been hacked. As a result, the pictures of hundreds of monitored children were leaked online, protected only by an…

CYBER NEWS

CVE-2018-9489 Allows Permission Checks Bypass, Only Fixed in Android P

CVE-2018-9489 is the identifier of a brand new security flaw affecting Android. The vulnerability allows malicious apps to bypass permission checks and is also easily obtaining access to read more information. This could enable malware to track device location, among…

CYBER NEWS

MagentoCore: the Most Aggressive Skimmer Infects 60 Stores per Day

Security researcher Willem de Groot recently unearthed the most successful (so far) skimming campaign, at the center of which is the MagentoCore skimmer. The skimmer has already infected 7,339 Magento stores in the last 6 months, thus becoming the most…

CYBER NEWS

Botnet Activity in 2018 Shows Increased Distribution of RATs

Recent analysis by Kaspersky Lab researchers indicates that threat actors are increasingly distributing multipurpose malware, which can be deployed in a variety of attack scenarios. More than 150 Malware Families Analyzed The team analyzed more than 150 malware families along…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree