Cyber News - Page 80

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

CVE-2018-11776 Proof-of-Concept Published on GitHub

Last week, we reported about CVE-2018-11776, a new highly critical vulnerability residing in Apache Strut’s core functionality, also described as a remote code execution vulnerability that affects all supported versions of Apache Struts 2. The flaw is located in the…

CYBER NEWS

New Mirai Botnet Мakes Cross-Platform Infections Possible

A new Mirai botnet version has been released by computer hackers as new attacks deploying it have been detected. The attack campaigns are global and target both individual users and service devices. This is one of the most popular weapons…

CYBER NEWS

How Honest Was T-Mobile about the Enormous Data Breach?

Another significant data breach affecting an international company was recently disclosed. T-Mobile announced that it was hit by hackers and as a result of the attack, personal information of some 2 million customers was compromised. This personal information includes name,…

CYBER NEWS

Key Interventions for Electronic Healthcare Record Security

Cyber-attacks have become the biggest reason of concern for organizations and individuals alike. This concern mainly stems from the fact that organizations are ill-prepared to deal with cyber threats. To add to this, hackers are leaving no stone unturned to…

CYBER NEWS

CVE-2018-11776: New Critical Struts Flaw Could Be Worse than Equifax

A new vulnerability has been uncovered – the kind that could turn out worse than the one that triggered the Equifax breach. The vulnerability has been identified as CVE-2018-11776, residing in Apache Strut’s core functionality. It is a remote code…

CYBER NEWS

PII, Android and iOS: Most Invasive App Permissions in 2018

Mobile privacy is an area that every user should be paying attention to. In other words, users should be very concerned with the privacy of their smartphones and the personal information shared with app developers. And there are is plenty…

CYBER NEWS

Google May Face Lawsuit after Location Tracking Reports Amass

Users have increasingly reported opting out of Google’s tracking services only to find out the company has continued to track them, resulting in activists and other people alike reporting the tech giant massively, leading to a lawsuit. The tech giant…

CYBER NEWS

Misconfigured MQTT Protocol Puts Thousands of Smart Homes at Risk

To no one’s surprise, there is a relatively easy way for hackers to breach thousands of smart homes. Avast researchers recently warned about the MQTT protocol (Message Queuing Telemetry Transport) which, if misconfigured, could give hackers complete access to a…

CYBER NEWS

SUSE and Microsoft Announce Enterprise Linux Kernel for Azure

A new announcement has been made in regards of SUSE and the availability of the enterprise Linux kernel which is created specifically for Microsoft Azure. As a result, SUSE Linux Enterprise Server 15 on-demand instances now run on a custom-tuned…

CYBER NEWS

Fake Fortnite Android Installers Spread Malware in Global Attack Campaign

Security experts detected that an ongoing attack campaign is spreading fake Fortnite Android games that lead to malware infections. Several outlets are being used to push the malicious apps — both third-party repositories and fake download sites. Malicious Fortnite Installers…

CYBER NEWS

Apple Hacked by a 16-year Old Hacker, Sensitive Data Stolen via the Attack

Australian media reports that a 16 year-old hacker was able to hack into Apple servers and hijack sensitive data. The report came after a police investigation and the proceeding court actions. Detailed information is not available at this moment. Apple…

CYBER NEWS

Potential BlackIT Botnet Attacks Can Bring down IoT Devices

A group of researchers presented a concept malware called the BlackIoT botnet which can be used in targeted attacks against IoT devices on a global scale. Details about the threat are available in a keynote presentation presented at a security…

CYBER NEWS

Cortana Flaw Allows Bypassing Windows 10 Lock Screen

Researchers have shown a simple method which could turn out to be a physical type of security risk for victims, using Cortana. Just like Siri, Cortana is enabled by default on all Windows 10 devices and the assistant works even…

CYBER NEWS

Trickbot Banking Trojan August 2018 Updated with Stealth Code Injection

The Trickbot banking Trojan has received an August 2018 update which adds a new code injection module. The infamous malware has remained active over the years as one of the most prominent Trojans used for financial crimes. The newly added…

CYBER NEWS

Necurs Botnet Campaign Targets Banks with Malware .Pub Files

The Necurs botnet is being used in a new attack campaign concentrating banks worldwide. The latest security reports indicate that the attackers utilize .PUB files which are Microsoft Publisher documents. Read our article to learn more about the incidents. Necurs…

CYBER NEWS

CVE-2018-6177 Chrome Bug Allows Hackers to Steal Sensitive Data via HTML Tags

A Chrome browser vulnerability known under the CVE-2018-6177 identifier, recently discovered by Imperva researcher Ron Masas, was just patched by Google. The security flaw could allow an attacker to retrieve sensitive data from websites using audio or video HTML tags.…

CYBER NEWS

Indian Cosmos Bank Malware Attack Ends with Theft of $13.5 Million

Cosmos Bank, known as India’s second-largest cooperative bank, has been breached by hackers, and a total of 940 million rupees, or $13.5 million, were stolen. More specifically, attackers stole customer details via a malware attack on the bank’s ATM servers,…

CYBER NEWS

Smartphones Vulnerable to New Form of Attacks Via microSD Cards

Security researchers at CheckPoint have warned about a new danger for our mobile devices, using a vulnerability that goes through the microSD cards. These forms of modified microSD cards can reportedly allow hackers to take over your smartphone by using…

CYBER NEWS

Instagram Users Face Login Issues, Large-Scale Hacking Attack Suspected

Security reports indicate that Instagram users experience serious login issues which is probably caused by a worldwide hacking attack. The reason for this is a continued wave of apparent account takeovers of insecure accounts in a seemingly automated manner. This…

CYBER NEWS

APSB18-29: Adobe Releases August 2018 Security Updates

Adobe released the August 2018 Security Updates (APSB18-29)which addresses key vulnerabilities in the Acrobat and Reader applications. The released collection of updates are available both to Windows and Mac OS X users. All users running these products are advised to…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree