Cyber News - Page 82

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

CVE-2018-5390: Vulnerability in Linux Kernel Allows for DoS Attacks

A vulnerability has been identified in the Linux Kernel (version 4.9+) which is tracked in the CVE-2018-5390 advisory. It lists several conditions that allow criminals to modify packets leading to the coordination of DoS (Denial of service) attacks. CVE-2018-5390 Advisory…

CYBER NEWS

Highly Critical CVE-2018-5924 in HP Printers, Update Firmware Now!

A couple of new critical security flaws were found in HP printers. CVE-2018-5924, CVE-2018-5925 in HP Printers One of the vulnerabilities resides in the firmware of certain HP printers, and it has been classified as very critical. This vulnerability is…

CYBER NEWS

Tech Support Scams Now Use Call Optimization Services

Computer security experts note that tech support scams are being updated to use call optimization services. Such platforms and tools are commonly used in legitimate call centers and service desks. This shows that the tech support scams continue to be…

CYBER NEWS

Twittersploit Attack Leverages Dangerous Twitter Malware

Security experts alerted of a dangerous new infection methodology known as the Twittersploit Attack. In the center of it all is the use of several malware instances that use the Twitter social network service as a C&C (command and control)…

CYBER NEWS

New Attack on WPA/WPA2 Discovered, Most Modern Routers at Risk

A new attack on Wi-Fi protected access protocols has been discovered. The new technique to crack WPA PSK (Pre-Shared Key) passwords enables outside users to capture access credentials easily. The discovery of the attack was accidental – the Hashcat developers…

CYBER NEWS

CVE-2018-14773 Symfony Flaw Affects Drupal Versions 8.x-8.5.6

A new vulnerability has been discovered, CVE-2018-14773, that affects Drupal, the popular open-source content management system. More specifically, the vulnerability resides in a component of a third-party library called Symfony Http Foundation component. The component is part of Drupal Core,…

CYBER NEWS

Cisco to Acquire Duo Security for $2.35 Billion in Cash

Cisco just announced a big acquisition, in the size of $2.35 billion in cash. The company is acquiring cloud-based identity and access management solutions provider Duo Security. “Cisco (NASDAQ: CSCO) today announced its intent to acquire privately-held Duo Security, headquartered…

CYBER NEWS

CCleaner v5.45 Introduces Data Collection with No Way to Opt-Out

Last year, security researchers uncovered that the popular PC cleaner CCleaner was backdoored. Older versions of Piriform CCleaner -v5.33.6162 and CCleaner Cloud v1.07.3191- had been compromised, and as a result millions of users were affected. New Changes in CCleaner Version…

CYBER NEWS
Reddit Data Breach Let Hackers Steal Sensitive User Data sensorstechforum

Reddit Data Breach Let Hackers Steal Sensitive User Data

The popular social news and entertainment network Reddit announced that its servers were successfully compromised by hackers. The attack which was detected on June 19 let hackers obtain sensitive user data including usernames, hashed passwords, email addresses as well as…

CYBER NEWS

CoinHive Miner Virus Outbreak Has Infected 170,000 Routers

The Coinhive Miner virus has infected hundreds of thousands MikroTik routers. The malware has now reportedly installed a JavaScript miner to over 170,000 devices and this recent outbreak is believed to be getting bigger and bigger. The first hint of…

CYBER NEWS

Steam Alert: Abstractism Game Exploited Gamers’ CPU for Cryptomining

Numerous Steam users have reported that a game titled Abstractism is consuming way too much CPU power to mine for cryptocurrency. The game was also selling marketplace items that were masqueraded as goods from popular games such as Team Fortress…

CYBER NEWS

Spam in 2018: Beware ZIP, .DOC, .XLS, .PDF, and .7Z File Attachments

New security statistics reveal that spam is one of the most common methods used to distribute malware to potential victims. Because of the high click rate, malicious email messages continue to be a preferred technique among cybercriminals. F-Secure researchers recently…

CYBER NEWS

Back to the Past: Bitpaymer Virus Reverts Alaskan Town to Typewriters

Here you will find out how the BitPaymer ransomware cryptovirus had forced people in some parts of Alaska, USA to go back to using typewriters. That is due to the computer systems getting compromised with said cryptovirus and as a…

CYBER NEWS

Ubuntu 18.04 Security Guide Helps Both Organizations and Home Users

Ubuntu 18.04 has been updated with a brand new security guidance released by the National Cyber Security Centre, a department of GCHQ (Government Communications Headquarters). The guidance was developed after testing on devices running Ubuntu 18.04 LTS. More about the…

CYBER NEWS

One-of-a-Kind HP Printer Bug Bounty to Improve Network Security

Printers are often the weakest link in an organization, with printer vulnerabilities being exploited in various malicious campaigns to compromise entire networks. One such vulnerability was disclosed in 2017, and enabled hackers to carry out remote code execution attacks on…

CYBER NEWS
AZORult Spyware Version 3.2 More Abusive Than Ever sensorstechforum

AZORult Version 3.2 Spyware More Abusive Than Ever

AZORult is an information stealer and downloader designed to harvest various sensitive details from the systems it compromises. The malware was first identified in 2016 when it was distributed as a part of an infection with Chthonic banking Trojan. Soon…

CYBER NEWS

CVE-2018-10901 in Linux Kernel Could Lead to Privilege Escalation

CVE-2018-10901 is the identifier of a recently disclosed vulnerability in Linux kernel. More specifically, the vulnerability resides in the KVM virtualization subsystem, a full virtualization solution for Linux on x86 hardware containing virtualization extensions. Using KVM, a user can run…

CYBER NEWS

Kronos Banking Trojan Evolves to Osiris

This article is about the newest iteration of the Kronos Banking Trojan and what new features it brings to the cybersecurity landscape. Malware researchers ponder whether the malware has developed into the new Osiris Trojan horse. Kronos Banking Trojan 2018…

CYBER NEWS
20 Vulnerabilities in Samsung SmartThings Hub Disrupt IoT Security

20 Vulnerabilities in Samsung SmartThings Hub Disrupt IoT Security

A research conducted by Cisco Talos researchers indicates that 20 vulnerabilities that affect Samsung’s SmartThings Hub may enable hackers to compromise third-party smart devices. A successful exploit of these vulnerabilities could let attackers connect remotely the devices and obtain sensitive…

CYBER NEWS

Demand for Malware In Dark Web Higher than Supply for 2018

Demand for all types of malware has skyrocketed and keeps growing in the underground cyber-criminal markets and has already surpassed the currently supply, PTSecurity has reported. In line with the financial losses caused by malware which are increasing steadily, the…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree