Cyber News - Page 90

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Over 5,000 HPE iLO 4 Interfaces Hit By Ransomware

This article is about a recent ransomware threat that has hit thousands of Hewlett-Packard Enterprise Integrated Lights-Out 4 interfaces or HPE iLO 4 for short. These interfaces provide access to HP Enterprise servers and their remote control. The ransomware threat…

CYBER NEWS

Largest DDoS-for-Hire Service Taken Down, Attack Price Was $14.99

The world’s biggest DDoS-for-hire service, Webstresser.org, is now down thanks to a coordinated international operation. The DDoS provider was shut down on Wednesday after a thorough investigation carried out by UK’s National Crime Agency and the Dutch National Police and…

CYBER NEWS

CVE-2018-7602 Highly Critical Drupal Bug Actively Exploited in the Wild

Drupalgeddon continues with one more remote code execution bug has been discovered in content management system. Identified as CVE-2018-7602, the highly critical vulnerability affects Drupal versions 7.x and 8.x. Affected users should immediately upgrade to Drupal v7.59 and 8.5.3. The…

CYBER NEWS

PyRoMine Utilizes EternalBlue Exploit, Disables Security Features

Cryptomining malware has dethroned ransomware as the number one cyber threat, and as such, it is evolving rapidly. That being said, a Python-based Monero miner using stolen NSA exploits and disabling security features has been discovered by security researchers. Related…

CYBER NEWS

20 Million Google Chrome Users Downloaded Fake Ad Block Extensions

Security researchers at AdGuard recently revealed some interesting findings regarding the use of fake ad block extensions. There is evidence that some twenty million Chrome users have been tricked into downloading and installing rogue browser extensions concealed as ad blocking…

CYBER NEWS

Tech-Support Scams on the Rise, Microsoft and the FBI Say

New Microsoft statistics reveal that the Windows operating system was continuously targeted by tech-support scams in 2017. More precisely, Microsoft recently reported that it received 153,000 reports from users who were targeted by tech-support scammers via the phone or the…

CYBER NEWS

Router Security Anyone? Users Widely Unaware of Router Security Risks

Not enough users are acquainted with the risks associated with their routers, and there’s a research that proves it. Broadband Genie researchers surveyed 2,205 people across the U.K. whether they had performed any router security hygiene like changing Wi-Fi passwords…

CYBER NEWS

Autofill with LinkedIn Bug Could Lead to User Data Harvesting

A critical security bug has been discovered in LinkedIn, more specifically in a social button. The exploit of the bug could have led to harvesting of LinkedIn users’ information, including information that wasn’t public. The discovery was made by Jack…

CYBER NEWS

CVE-2018-0112 in Cisco WebEx Could Lead to Remote Attacks

Another critical vulnerability identified as CVE-2018-0112 has been fixed Cisco WebEx videoconferencing software solution. Customers download and use the WebEx client application to attend meetings on Cisco WebEx Centers The bug could be leveraged by attackers to intercept conference call…

CYBER NEWS
Dardesh android malware app image

Dardesh Android Chat App May Be Spying on You

Security researchers discovered a new threat known as Dardesh that poses as a legitimate app and is currently available on the Google Play Store. The malware instance is described as a chat app and has managed to fool many users…

CYBER NEWS

Q1 2018 Malware Report: Ransomware Dethroned by Cryptominers

The first quarter of 2018 has already passed, and security researchers were able to draw some important conclusions. It appears that during the first three months of this year, ransomware was finally dethroned. The new most prevalent cybersecurity threat is…

CYBER NEWS

Roskomnadzor Bans 1.8 Million Google and Amazon IP Addresses

strong>Roskomnadzor, Russia’s telecommunications watchdog, banned today over 1.8 million IP addresses belonging to Amazon and Google’s cloud infrastructure. Roskomnadzor Bans More Than 1.8 Million IP Addresses Belonging to Amazon and Google It has been reported that Roskomnadzor, Russian Federal Service…

CYBER NEWS

Intel Deploys Threat Detection Technology, Enables GPU Scanning

Intel has just announced several new initiatives that use features specific to the Intel hardware platform to improve security, Arstechnica reported. The first one of these initiatives is Intel Threat Detection Technology (TDT) which is designed to use specific features…

CYBER NEWS

JavaScript SecureRandom() Function Exposes Bitcoin Wallets

Researchers have discovered a vulnerability residing in the JavaScript SecureRandom() function used for generating random Bitcoin addresses and their corresponding private keys. The flaw makes old Bitcoin addresses generated in the browser or via JS-based wallet application vulnerable to brute-force…

CYBER NEWS

EITest TDS Sinkholed: 52,000 Servers Delivering Malware Taken Down

The largest traffic distribution system (TDS) known as EITest was just taken down by security researchers from Abuse.ch, BrilliantIT, and Proofpoint. The expert group sinkholed the command and control infrastructure behind the network of hacked servers that had been used…

CYBER NEWS

Check Your Phone: Researchers Find Hidden Patch Gap in Android

Researchers Karsten Nohl and Jakob Lell from security firm Security Research Labs have uncovered a hidden patch gap in Android devices. The two conducted a two-year analysis of 1,200 Android phones, and just presented their results during the Hack in…

CYBER NEWS

PowerHammer: the Malware That Plunders Data via Power Lines

Malicious code is capable of evolving, and so has proved a team of researchers from Ben-Gurion University of the Negev in Israel that successfully created and tested malware able to exfiltrate data from air-gapped machines through power lines. Тhe newly…

CYBER NEWS

Fake Update Campaign Affects Thousands of CMS-Based Websites

A new malware campaign has been discovered leveraging an increasing number of legitimate but compromised websites. The malicious operation has been built on social engineering tricks where users are prompted with fake but authentic update notifications, researchers reported. Fake Update…

CYBER NEWS

Too Little, Too Late: Facebook Launches Data Abuse Bounty

Facebook just announced launching a Data Abuse Bounty program where people will be rewarded for reporting misuse of data by application developers. Facebook’s Data Abuse Bounty – the Details The Data Abuse Bounty is inspired by the already existing bug…

CYBER NEWS
HTTP Injector image

HTTP Injector Attacks Harvest Mobile Data Connections

Computer security researchers uncovered a new malware tactic that uses a HTTP injector attack capable of harvesting mobile data connections. The criminals are actively using this strategy to gain free Internet access. HTTP Injector Attack Method Revealed Related Story: TeleRAT…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree