Cyber News - Page 95

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
JenX botnet image

JenX Botnet Recruits Devices Via Grand Theft Auto Servers

Computer security experts reported the discovery of a new malware threat called the JenX Botnet which uses highly unusual distribution tactics. Instead of relying on standard email messages it abuses one of the most popular video games — Grand Theft…

CYBER NEWS

Creative.Update Mac Miner Distributed via MacUpdate

A new cryptocurrency miner delivered through MacUpdate has been uncovered by security researchers. The malware which was discovered by SentinelOne researcher Arnaud Abbati has been dubbed OSX.CreativeUpdate. The miner can reside in the background of the system and use its…

CYBER NEWS
ICO security image

ICO Security: Current Threats and Trends

The ICO (initial coin offering) sales and offers are gaining popularity among investors worldwide. Advertisements, long business plans and elaborate marketing strategies are used to bring potential buyers into hundreds of platforms. However the cybersecurity risks associated with these practices…

CYBER NEWS

CVE-2018-4878 Flash Player Flaw: What You Need to Know

Adobe Flash Player has been long targeted by hackers. Plenty of vulnerabilities have been uncovered during the years, and plenty of attacks based on Adobe flaws have been crafted. This year also starts off with a critical vulnerability that was…

CYBER NEWS
Smominru botnet

Smominru Botnet Infects Machines With Monero Cryptocurrency Miner

Cybersecurity analysts discovered a massive worldwide attack carrying a dangerous malware called the Smominru botnet. It is capable of manipulating the configuration of the compromised hosts and has been found to install a Monero cryptocurrency miner which takes advantage of…

CYBER NEWS

DDG Monero Mining Botnet Targets Redis and OrientDB Servers

A new botnet carrying out large-scale attacks has been discovered by security researchers. The botnet is dubbed DDG and is proclaimed the second biggest mining botnet ever. Its targets are the Redis and OrientDB servers. DDG.Mining.Botnet Attacks Description A couple…

CYBER NEWS

WannaMine – Cryptoworm That Mines Monero by Force

WannaMine is the name of the latest malware attack that uses the NSA exploit “EternalBlue”. Malware researchers from Panda Security were first to discover it back in October last year. The WannaMine malware uses two Windows in-built tools – PowerShell…

CYBER NEWS
Droidclub Botnet image

Droidclub Botnet Infiltrates Machines Via Google Chrome Extensions

A new security report indicates that the newly discovered DroidClub Botnet infects targets via malware Google Chrome extensions. According to the analysis the virus has already managed to infect more than half a million users worldwide through multiple instances that…

CYBER NEWS

Google’s DoubleClick Network Abused to Spread Cryptocurrency Miners

Computer security experts uncovered that Google’s DoubleClick network is being used by criminals to delivery malware cryptocurrency miners. This is the company’s subsidiary that provides Internet ad services and is used by the largest agencies and publishers to deliver targeted…

CYBER NEWS

Over 700,000 Malicious Apps Removed from Google Play in 2017

According to statistics provided by Andrew Ahn, Product Manager at Google, the company removed over 700,000 Android app from the Play Store last year. In 2017, the Google team took down more than 700,000 apps that violated the Google Play…

CYBER NEWS
Ransomware Predictions 2018

Ransomware Predictions for 2018: Infections Will Continue to Rise

It’s 2018, and security professionals across the globe are on standby, waiting for next big wave of ransomware attacks to make landfall. According to Symantec’s Ransomware 2017 report, the number of ransomware infections is continuing to rise. During the first…

CYBER NEWS

FriedEx – Stealthy Ransomware Crafted by Dridex Authors

The infamous Dridex banking Trojan has now shifted towards ransomware in its FriedEx (also known as BitPaymer) variant. Image Source: ESET Related Story: Dridex Spread via Compromised OneDrive for Business Accounts “Dridex has been a nightmare for computer users, companies…

CYBER NEWS
Vermin virus image

Vermin Complex Malware and Rat Set Against Ukraine

Security analysts detected a new attack campaign that is focused on Ukraine carrying a dangerous new weapon — the Vermin malware. According to the released reports this is a heavily updated version of the Quasar Trojan that has been further…

CYBER NEWS

Onion.to Tor-to-Web Steals from Ransomware Operators and Victims

Stealing from Ransomware Operators and Ransomware Victims? Mission Possible, Says Onion.to Tor-to-web Proxy Service Security researchers at Proofpoint have reported that the operators of a Tor proxy service were detected replacing Bitcoin addresses on ransomware payment websites. This means that…

CYBER NEWS
Hide 'N Seek IoT Botnet image

The Hide ’n Seek IoT Botnet Uses P2P to Target Devices

Security analysts uncovered a new worldwide malware threat — the Hide ‘N Seek IoT botnet which uses a custom-built P2P communication module to spread itself. The infections are rapidly increasing and it appears that separate attacks are being launched against…

CYBER NEWS
Lenovo Fingerprint Security image

Lenovo Fingerprint Security Can Be Bypassed via a Hard-Coded Password

Computer security researchers uncovered a dangerous security vulnerability in the Lenovo Fingerprint Manager Pro app. According to the reports the fingerprint security authentication can be easily bypassed by malware users by inputting a hard-coded password. Lenovo Fingerprint Manager Pro Can…

CYBER NEWS
wordpress virus image

“Cloudflare.solutions” Malware Found on Hundreds of WordPress Websites

At least 2,000 WordPress websites have been compromised by a piece of malware designed to act like a cryptocurrency miner and a keystroke logger. The malware leverages the name of Cloudfare and was discovered several months ago by Sucuri researchers.…

CYBER NEWS

The Coincheck Heist Highlights What Is Wrong with Crypto Exchanges

The world’s biggest cryptocurrency theft (for now) is already a fact. Coincheck, the leading Bitcoin and cryptocurrency exchange in Asia as advertised on their website, has lost $530 million worth of cryptos. The theft has already caused a lot of…

CYBER NEWS

Chrome 64: Better Ad-Blocker, 53 Security Fixes, Spectre Patch

Chrome 64 for Windows, Mac and Linux has just been made available by Google. The latest version of the browser features a more powerful pop-up blocker, 53 security fixes, and further mitigations against the Spectre flaw. At the end of…

CYBER NEWS
Tinder logo

Tinder Bug Exposes Users Private Data to Strangers

The popular Tinder dating app has been identified with two serious vulnerabilities. Security experts identified a dangerous Tinder bug that can expose the swipes and matches of users to strangers. According to the provided information the flaw has been identified…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree