• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services

Latest Cyber Security Vulnerabilities

You are here: Home / Archives for Latest Cyber Security Vulnerabilities
watering hole attacks push scanbox keylogger

Watering Hole Attacks Push ScanBox Keylogger

Scientists uncover a watering gap attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-dependent reconnaissance device. A China-based mostly menace actor has ramped …

Watering Hole Attacks Push ScanBox KeyloggerRead More

ransomware attacks are on the rise

Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. Right after a latest dip, ransomware attacks are again on the rise. According to details …

Ransomware Attacks are on the RiseRead More

cybercriminals are selling access to chinese surveillance cameras

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Tens of 1000's of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of businesses uncovered. New study implies that over 80,000 Hikvision surveillance cameras in the …

Cybercriminals Are Selling Access to Chinese Surveillance CamerasRead More

firewall bug under active attack triggers cisa warning

Firewall Bug Under Active Attack Triggers CISA Warning

CISA is warning that Palo Alto Networks’ PAN-OS is underneath lively attack and demands to be patched ASAP. Software working Palo Alto Networks’ firewalls is underneath attack, prompting U.S. …

Firewall Bug Under Active Attack Triggers CISA WarningRead More

fake reservation links prey on weary travelers

Fake Reservation Links Prey on Weary Travelers

Fake journey reservations are exacting more ache from the journey weary, currently dealing with the distress of canceled flights and overbooked inns. A longtime threat team recognized as TA558 has …

Fake Reservation Links Prey on Weary TravelersRead More

iphone users urged to update to patch 2 zero days

iPhone Users Urged to Update to Patch 2 Zero-Days

Apple is urging macOS, iPhone and iPad people immediately to install respective updates this 7 days that contains fixes for two zero-days less than active attack. The patches are for vulnerabilities …

iPhone Users Urged to Update to Patch 2 Zero-DaysRead More

google patches chrome’s fifth zero day of the year

Google Patches Chrome’s Fifth Zero-Day of the Year

Google has patched the fifth actively exploited zero-working day vulnerability learned in Chrome this calendar year as 1 in a sequence of fixes integrated in a stable channel update released …

Google Patches Chrome’s Fifth Zero-Day of the YearRead More

u.k. water supplier hit with clop ransomware attack

U.K. Water Supplier Hit with Clop Ransomware Attack

The incident disrupted company IT units at just one enterprise even though attackers misidentified the target in a post on its site that leaked stolen data. A U.K. water supplier experienced a …

U.K. Water Supplier Hit with Clop Ransomware AttackRead More

xiaomi phone bug allowed payment forgery

Xiaomi Phone Bug Allowed Payment Forgery

Cell transactions could’ve been disabled, developed and signed by attackers. Smartphone maker Xiaomi, the world’s quantity a few phone maker guiding Apple and Samsung, described it has patched a …

Xiaomi Phone Bug Allowed Payment ForgeryRead More

black hat and def con roundup

Black Hat and DEF CON Roundup

‘Summer Camp’ for hackers attributes a compromised satellite, a homecoming for hackers and cyberwarfare warnings. There was almost nothing normal this year at BSides LV, Black Hat United states …

Black Hat and DEF CON RoundupRead More

feds: zeppelin ransomware resurfaces with new compromise, encryption tactics

Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics

The CISA has witnessed a resurgence of the malware concentrating on a assortment of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities. Zeppelin …

Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption TacticsRead More

microsoft patches ‘dogwalk’ zero day and 17 critical flaws

Microsoft Patches ‘Dogwalk’ Zero-Day and 17 Critical Flaws

August Patch Tuesday tackles 121 CVEs, 17 critical bugs and a person zero-working day bug exploited in the wild. Microsoft is urging end users to patch a zero-working day vulnerability dubbed …

Microsoft Patches ‘Dogwalk’ Zero-Day and 17 Critical FlawsRead More

open redirect flaw snags amex, snapchat user data

Open Redirect Flaw Snags Amex, Snapchat User Data

Separate phishing strategies concentrating on hundreds of victims impersonate FedEx and Microsoft, amongst some others, to trick victims. Attackers are exploiting a properly-recognized open redirect …

Open Redirect Flaw Snags Amex, Snapchat User DataRead More

vmware urges users to patch critical authentication bypass bug

VMWare Urges Users to Patch Critical Authentication Bypass Bug

Vulnerability—for which a proof-of-principle is forthcoming—is 1 of a string of flaws the business fixed that could direct to an attack chain. VMware and specialists alike are urging buyers to patch …

VMWare Urges Users to Patch Critical Authentication Bypass BugRead More

universities put email users at cyber risk

Universities Put Email Users at Cyber Risk

DMARC investigation by Proofpoint reveals that establishments in the U.S. have between some of the poorest protections to reduce area spoofing and lack protections to block fraudulent emails. Top …

Universities Put Email Users at Cyber RiskRead More

malicious npm packages tapped again to target discord users

Malicious Npm Packages Tapped Again to Target Discord Users

Latest LofyLife marketing campaign steals tokens and infects customer documents to observe a variety of user actions, these types of as log-ins, password improvements and payment techniques. Menace …

Malicious Npm Packages Tapped Again to Target Discord UsersRead More

threat actors pivot around microsoft’s macro blocking in office

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

Cybercriminals change to container data files and other techniques to get about the company’s attempt to thwart a well known way to deliver destructive phishing payloads. Menace actors are acquiring …

Threat Actors Pivot Around Microsoft’s Macro-Blocking in OfficeRead More

vulnerabilities are beyond what you think

Vulnerabilities are Beyond What You Think

CVEs or Program vulnerabilities contains only a element of security challenges in the IT security landscape. Attack surfaces are significant with quite a few security hazards that have to be dealt …

Vulnerabilities are Beyond What You ThinkRead More

messaging apps tapped as platform for cybercriminal activity

Messaging Apps Tapped as Platform for Cybercriminal Activity

Built-in Telegram and Discord services are fertile ground for storing stolen data, hosting malware and using bots for nefarious purposes. Cybercriminals are …

Messaging Apps Tapped as Platform for Cybercriminal ActivityRead More

messaging apps tapped as platform for cybercriminal activity

Messaging Apps Tapped as Platform for Cybercriminal Activity

Developed-in Telegram and Discord solutions are fertile ground for storing stolen facts, hosting malware and utilizing bots for nefarious uses. Cybercriminals are tapping the designed-in expert …

Messaging Apps Tapped as Platform for Cybercriminal ActivityRead More

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 87
  • Go to Next Page »

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.