Cyber News

Home > Cyber News

This category contains informative articles and news.
Cyber News about data breaches, online privacy and security, computer security threats, cybersecurity reports, vulnerability reports. News about the latest malware attacks.
Hot news about the security of Microsoft (Patch Tuesdays), Google, Android, Apple, Linux, and other big companies and software vendors.

CYBER NEWS
New Native Spectre v2 Exploit Raises Concerns for Linux Kernel Security

New Native Spectre v2 Exploit Raises Concerns for Linux Kernel Security

Cybersecurity researchers from the Systems and Network Security Group (VUSec) at Vrije Universiteit Amsterdam have unveiled what they describe as the “first native Spectre v2 exploit” against the Linux kernel on Intel systems. This exploit, named Native Branch History Injection…

CYBER NEWS
Google Introduces V8 Sandbox in Chrome to Enhance Security

Google Introduces V8 Sandbox in Chrome to Enhance Security

Google has unveiled a new feature called the V8 Sandbox in its Chrome web browser to address memory corruption issues, aiming to protect against vulnerabilities. “After almost three years since the initial design document and hundreds of CLs in the…

CYBER NEWS
HTTP2 Flaw Puts Web Servers at Risk of DoS Attacks [CVE-2024-27983]

HTTP/2 Flaw Puts Web Servers at Risk of DoS Attacks [CVE-2024-27983]

A new research conducted by security expert Bartek Nowotarski has unearthed a potential vulnerability in the HTTP/2 protocol. Known as the CONTINUATION Flood, this exploit allows attackers to conduct denial-of-service (DoS) attacks by flooding a server with CONTINUATION frames. The…

CYBER NEWS
CVE-2024-3094 Malicious Code in XZ Utils Enables RCE on Linux Systems

CVE-2024-3094: Malicious Code in XZ Utils Enables RCE on Linux Systems

A recent analysis has revealed that the malicious code embedded in the widely-used open-source library XZ Utils (present in multiple Linux distros) can enable remote code execution. The attack scenario is based on the critical CVE-2024-3094 vulnerability. CVE-2024-3094 Explained This…

CYBER NEWS
Google to Erase Billions of Incognito Mode Browsing Records

Google to Erase Billions of Incognito Mode Browsing Records

In response to a class action lawsuit filed in 2020, Google has opted to settle by agreeing to delete billions of data records concerning users’ browsing activities. The lawsuit alleged that Google tracked users without their consent while using the…

CYBER NEWS
Call of Duty Players Targeted in Bitcoin Malware Attack

“Call of Duty” Players Targeted in Bitcoin Malware Attack

In a startling development, gamers playing “Call of Duty” have fallen victim to a sophisticated cyber attack aimed at draining Bitcoin wallets. The attack, orchestrated through third-party cheat software, has sent shockwaves through the gaming community, raising concerns about the…

CYBER NEWS
CVE-2024-28085 Linux Flaw Could Leak Passwords

CVE-2024-28085: Linux Flaw Could Leak Passwords

A recently identified vulnerability affecting the “wall” command in the util-linux package has raised concerns among Linux users. Assigned CVE-2024-28085 and named WallEscape by security researcher Skyler Ferrante, the flaw allows unprivileged users to manipulate terminal output, potentially leaking passwords…

CYBER NEWS
CVE-2024-21388 Enables Silent Installation of Malicious Extensions

CVE-2024-21388 Enables Silent Installation of Malicious Extensions

A recently patched security vulnerability in Microsoft Edge could have allowed malicious actors to stealthily install arbitrary extensions on users’ systems, potentially leading to harmful actions. CVE-2024-21388 Explained Discovered by Guardio Labs security researcher Oleg Zaytsev and tracked as CVE-2024-21388,…

CYBER NEWS
CVE-2023-48022 ShadowRay Flaw a Critical Threat to AI Infrastructure

CVE-2023-48022: ShadowRay Flaw a Critical Threat to AI Infrastructure

The Oligo research team recently uncovered an ongoing attack campaign, dubbed ShadowRay, targeting a vulnerability in Ray, a widely utilized open-source AI framework. This vulnerability, currently unresolved and lacking a patch, poses a critical threat to thousands of companies and…

CYBER NEWS
Apple M-1, M-2 Chips Vulnerable to GoFetch Attack, Encryption Keys Exposed

Apple M-1, M-2 Chips Vulnerable to GoFetch Attack, Encryption Keys Exposed

Researchers unearthed a significant vulnerability lurking within Apple’s M-1 and M-2 chips, potentially exposing a chink in the armor of the tech giant’s acclaimed security infrastructure. Dubbed “GoFetch,” this exploit targets the microarchitecture of Apple’s chips, exploiting a flaw that…

CYBER NEWS
New Loop DoS Attack Based on CVE-2024-2169 in UDP Protocol

New Loop DoS Attack Based on CVE-2024-2169 in UDP Protocol

A newly identified denial-of-service attack, named Loop DoS, is causing concerns among cybersecurity experts. This sophisticated attack targets application layer protocols and can lead to large-scale traffic disruptions by creating indefinite communication loops between network services. Researchers at the CISPA…

CYBER NEWS
Operation PhantomBlu Phishing Attack Uses MS Documents to Deliver NetSupport RAT-min

Operation PhantomBlu Phishing Attack Uses MS Documents to Deliver NetSupport RAT

A sophisticated phishing campaign against U.S. organizations has been deploying a remote access trojan known as NetSupport RAT. Dubbed “Operation PhantomBlu,” the activity has been closely monitored by Israeli cybersecurity firm Perception Point. According to security researcher Ariel Davidpur, the…

CYBER NEWS
image contains text: CVE-2024-21412 Used in DarkGate Malware Campaigns-min

CVE-2024-21412 Used in DarkGate Malware Campaigns

A DarkGate malware campaign observed in mid-January 2024 has highlighted the exploitation of a recently patched security flaw in Microsoft Windows as a zero-day vulnerability, utilizing counterfeit software installers to propagate its nefarious payload. Trend Micro reported that during this…

CYBER NEWS
Nissan Oceania Attack Exposes 100,000 to Identity Theft

Nissan Oceania Attack Exposes 100,000 Victims to Identity Theft

In a recent cyber attack on Nissan Oceania’s systems, around 100,000 individuals in Australia and New Zealand have fallen victim to data theft, possibly orchestrated by the notorious Akira ransomware gang. The breach, which occurred in December 2023, has left…

CYBER NEWS
image contains text: March 2024 Patch Tuesday Significant Vulnerabilities

March 2024 Patch Tuesday: Significant Vulnerabilities

Microsoft has rolled out its latest batch of security fixes for March 2024 Patch Tuesday, addressing a total of 59 CVE-numbered vulnerabilities. The good news is that none of these vulnerabilities are currently known to be publicly exploited, offering a…

CYBER NEWS
Magnet Goblin Uses 1-Day Exploits to Drop Custom Malware on Linux, Windows-min

Magnet Goblin Uses 1-Day Exploits to Drop Custom Malware on Linux, Windows

A financially motivated cyber threat, dubbed “Magnet Goblin” by Check Point researchers, is leveraging known vulnerabilities in on public-facing services to distribute tailored malware to unpatched Windows and Linux systems. The Magnet Goblin threat actor, known for their persistent activity,…

CYBER NEWS
Intense DDoS Attacks against the French Government Raise Concerns

DDoS Attacks against the French Government Raise Concerns

The French Prime Minister’s office declared on Monday that several government agencies had fallen victim to severe cyberattacks of “intense” magnitude, commencing late Sunday night. While the precise nature of these assaults remains unconfirmed, indications point towards distributed-denial-of-service (DDoS) attacks…

CYBER NEWS
CVE-2024-20337 Allows Unauthorized Access to VPN Sessions

CVE-2024-20337 Allows Unauthorized Access to VPN Sessions

Cisco unveiled patches aimed at rectifying a high-severity security flaw discovered within its Secure Client software. This vulnerability, identified as CVE-2024-20337, poses a significant risk, allowing malicious actors to exploit it for unauthorized access to VPN sessions of targeted users.…

CYBER NEWS
Snake Python-Based Information Stealer Targets Facebook Users-min

Snake Python-Based Information Stealer Targets Facebook Users

A new threat has emerged targeting unsuspecting Facebook users. Dubbed “Snake,” this Python-based information stealer is engineered to infiltrate systems and capture sensitive data through Facebook messages. Python-based Snake Info Stealer Variants in the Wild According to Cybereason researcher Kotaro…

CYBER NEWS
Apple Fixes Actively Exploited Zero-Days in iOS (CVE-2024-23225)

Apple Fixes Actively Exploited Zero-Days in iOS (CVE-2024-23225)

Apple has taken measures to address two zero-day vulnerabilities detected in iOS, which were actively exploited in the wild. The tech giant promptly issued emergency security updates to patch the vulnerabilities. CVE-2024-23225 and CVE-2024-23296 Acknowledging the severity of the situation,…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree