Cyber News - Page 92

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS

Be Worried: Facebook Scraped SMS and Calls Data on Android Devices

Facebook is once again at the center of attention, following the events from last week when the Cambridge Analytica scandal burst out. Now, it has come to the attention of several users that the Facebook’s mobile apps for Android have…

CYBER NEWS

TeleRAT Android Trojan Uses Telegram Bot API for C&C Communication

TeleRAT is the name of the latest Android Trojan that was discovered by researchers at Palo Alto Networks. The Trojan is designed to use Telegram Bot API for communication with its command and control server with the purpose of exfiltrating…

CYBER NEWS

Monero Miner Hits Linux Servers Using the Old CVE-2013-2618

Trend Micro researchers have observed a new Monero cryptocurrency mining campaign that targets Linux servers. The campaign is using reused and known vulnerabilities – more particularly, a flaw that has been patched for five years. Users should note that the…

CYBER NEWS

Ledger Hardware Wallet Vulnerability Exposed by Teen Hacker

Ledger cryptocurrency hardware wallets have been found to be vulnerable, a teenage security researcher revealed in a blog post. The 15-year-old Saleem Rashid discovered the bug that allowed attackers to fabricate the device’s seed generation, and this way harvest any…

CYBER NEWS

CVE-2018-0878 in Windows Remote Assistance Discovered

CVE-2018-0878 is the identifier of an information disclosure vulnerability that exists in Windows Remote Assistance. The flaw is triggered when WRA incorrectly processes XML External Entities (XXE). An attacker who successfully exploits the flaw could obtain information further abuse the…

CYBER NEWS

50 Million Facebook Profiles Exploited for Trump’s Election Campaign

Probably the most important factor when it comes to Facebook criticism is the way the social network handles the personal data of its users. Privacy issues related to individual cases have fueled the debate over time. The majority of the…

CYBER NEWS

BlackTDS: Traffic Distribution Network as a Malicious Service

There were times, not too long ago, when exploit kits were widely deployed by hackers in various types of malicious campaigns. However, with the improvement of browsers and some other security-focused factors, the use of EKs began to decline, and…

CYBER NEWS

Prilex PoS Malware Has Everything Cybercrooks Need

Do you remember the Prilex PoS (point-of-sale) malware? Prilex is one of the latest strains of ATM malware pieces that has been used in highly targeted attacks on Brazilian banks. The malware has been developed using the Visual Basic 6.0…

CYBER NEWS

Bitcoin Real Estate, Gaming Currency Used by Crooks to Launder Money

According to a recent research by University of Surrey, cryptocurrencies have become the dominant tool for money laundering. How was the study conducted? Researchers gathered information directly from convicted cybercriminals and law-enforcement agencies. Apparently, crooks are using cryptocurrency to buy…

CYBER NEWS

Which Is the Most Popular Ransomware Family for 2017?

According to Microsoft’s Security Intelligence Report, Asia was the region with the highest number of ransomware infection in the period between February and December, 2017. The statistics are taken from the report’s special section dedicated to ransomware. Myanmar and Bangladesh…

CYBER NEWS

RottenSys Android Malware Pre-Installed on 5 Million Devices

Android is once again found to be vulnerable to a serious piece of malware, and this time the scale of the infection is larger than one could imagine. Security researchers came across a massive, unceasing campaign that has infected about…

CYBER NEWS

MailChimp Abused to Deliver GootKit Banking Malware for 4 Months

Apparently, MailChimp email service has been frequently abused to deliver spam messages carrying malware infections. Security researchers have been frustrated because this problem has been happening for quite some time. MailChimp Abused in Spam Campaigns Distributing Malware The issue needs…

CYBER NEWS

Three Popular VPNs Found to Be Leaking Real IP Addresses

Are you privacy-savvy and relying on a VPN to keep your online business to yourself? If so, you may want to know that a VPN recommendation site decided to test 3 VPNs to see whether they were flawlessly performing their…

CYBER NEWS

Bitcoin-Stealing Trojanized Apps Found on Download.com

Bitcoin is once again making the headlines, this time thanks to a piece of malware found on Download.com. The malware was stealing malware identified as through swapping user accounts with the accounts of the hackers behind the operation. This operation…

CYBER NEWS

CVE-2018-1050, CVE-2018-1057 Samba Flaws Endanger Servers

Two critical vulnerabilities (CVE-2018-1050, CVE-2018-1057) have been discovered in Samba, the open-source software that is a re-implementation of the SMB networking protocol. The Samba software can run on popular operating systems such as Windows, Linux, UNIX, IBM System 390, OpenVMS.…

CYBER NEWS

CVE-2018-0886 Critical Flaw Affects All Windows Versions

CVE-2018-0886 is the identifier of a critical flaw found in Credential Security Support Provider (CredSSP). The vulnerability affects all versions of Windows and allows malicious hackers remote access to exploit RDP (Remote Desktop Protocol) and WinRM (Windows Remote Management). Related…

CYBER NEWS

Necurs and Gamut Botnets Delivering 97% of All Spam to Your Inbox

Have you been wondering who is behind the enormous amount of spam you receive in your inbox? Security researchers at McAfee have the answer – two botnets are at fault for 97 percent of all spam emails sent out in…

CYBER NEWS

Highly Sophisticated Slingshot Malware Uses Routers to Infect

A highly sophisticated threat capable of cyber espionage via targeting routers has been uncovered by researchers at Kaspersky Lab. Dubbed Slingshot, the malware has been used in malicious campaigns on victims in the Middle East and Africa for several years.…

CYBER NEWS

CVE-2018-0141 Cisco Vulnerability Could Lead to Full System Control

CVE-2018-0141 has been identified as the latest vulnerability in Cisco’s Prime Collaboration Provisioning (PCP) software. Apparently, the software has a hardcoded password that could be leveraged by hackers aiming to obtain full control of the system. On top of this,…

CYBER NEWS

Mitigation against Memcached-Based DDoS Attacks Discovered

DDoS attacks based on Memcached servers can now be mitigated, researchers say. The mitigation method includes the victim sending a “flush_all” command back to the servers that initiated the attack. This method was suggested few days ago by one of…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree