• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services

Latest Cyber Security Vulnerabilities

You are here: Home / Archives for Latest Cyber Security Vulnerabilities
novel malware hijacks facebook business accounts

Novel Malware Hijacks Facebook Business Accounts

Newly discovered malware linked to Vietnamese risk actors targets customers via a LinkedIn phishing marketing campaign to steal info and admin privileges for economical obtain. A new malware is …

Novel Malware Hijacks Facebook Business AccountsRead More

iot botnets fuels ddos attacks – are you prepared?

IoT Botnets Fuels DDoS Attacks – Are You Prepared?

The enhanced proliferation of IoT gadgets paved the way for the increase of IoT botnets that amplifies DDoS attacks these days. This is a hazardous warning that the likelihood of a refined DDoS attack …

IoT Botnets Fuels DDoS Attacks – Are You Prepared?Read More

conti’s reign of chaos: costa rica in the crosshairs

Conti’s Reign of Chaos: Costa Rica in the Crosshairs

Aamir Lakhani, with FortiGuard Labs, solutions the concern Why is the Conti ransomware gang concentrating on individuals and enterprises in Costa Rica? Any time conflict erupts, persons are …

Conti’s Reign of Chaos: Costa Rica in the CrosshairsRead More

magecart serves up card skimmers on restaurant ordering systems

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

300 eating places and at minimum 50,000 payment playing cards compromised by two independent campaigns in opposition to MenuDrive, Harbortouch and InTouchPOS products and services. Magecart …

Magecart Serves Up Card Skimmers on Restaurant-Ordering SystemsRead More

google boots multiple malware laced android apps from marketplace

Google Boots Multiple Malware-laced Android Apps from Marketplace

Google eradicated 8 Android apps, with 3M cumulative downloads, from its market for remaining infected with a Joker spy ware variant. Google has removed 8 apps from its Google Participate in …

Google Boots Multiple Malware-laced Android Apps from MarketplaceRead More

cisa urges patch of exploited windows 11 bug by aug.

CISA Urges Patch of Exploited Windows 11 Bug by Aug. 2

Feds urge U.S. organizations to patch a Microsoft July Patch Tuesday 2022 bug that is staying exploited in the wild by August 2. A Windows 11 vulnerability, part of Microsoft’s Patch Tuesday …

CISA Urges Patch of Exploited Windows 11 Bug by Aug. 2Read More

emerging h0lygh0st ransomware tied to north korea

Emerging H0lyGh0st Ransomware Tied to North Korea

Microsoft has connected a threat that emerged in June 2021 and targets little-to-mid-sized companies to point out-sponsored actors tracked as DEV-0530. Microsoft researchers have linked an emerging …

Emerging H0lyGh0st Ransomware Tied to North KoreaRead More

journalists emerge as favored attack target for apts

Journalists Emerge as Favored Attack Target for APTs

Considering the fact that 2021, many point out-aligned threat groups have turned up their targeting of journalists to siphon information and credentials and also keep track of them. Qualified …

Journalists Emerge as Favored Attack Target for APTsRead More

hybrid work reality drives hardware based security strategies

Hybrid-Work Reality Drives Hardware-based Security Strategies

New remote enterprise truth pushes security groups to retool to guard increasing attack surface area. Distant workforce, hybrid-cloud and Zero-Rely on trends are pushing security teams to focus on …

Hybrid-Work Reality Drives Hardware-based Security StrategiesRead More

‘callback’ phishing campaign impersonates security firms

‘Callback’ Phishing Campaign Impersonates Security Firms

Victims instructed to make a phone phone that will direct them to a url for downloading malware. A new callback phishing campaign is impersonating well known security companies to consider to trick …

‘Callback’ Phishing Campaign Impersonates Security FirmsRead More

sneaky orbit malware backdoors linux devices

Sneaky Orbit Malware Backdoors Linux Devices

The novel risk steals facts and can affect all procedures functioning on the OS, thieving facts from unique instructions and utilities and then storing it on the impacted machine. A sneaky malware …

Sneaky Orbit Malware Backdoors Linux DevicesRead More

u.s. healthcare orgs targeted with maui ransomware

U.S. Healthcare Orgs Targeted with Maui Ransomware

Point out-sponsored actors are deploying the special malware–which targets unique files and leaves no ransomware note–in ongoing attacks. Quite a few federal organizations are warning health care …

U.S. Healthcare Orgs Targeted with Maui RansomwareRead More

hack allows drone takeover via ‘expresslrs’ protocol

Hack Allows Drone Takeover Via ‘ExpressLRS’ Protocol

A radio regulate technique for drones is susceptible to remote takeover, many thanks to a weak spot in the mechanism that binds transmitter and receiver. The popular protocol for radio controlled …

Hack Allows Drone Takeover Via ‘ExpressLRS’ ProtocolRead More

latest cyberattack against iran part of ongoing campaign

Latest Cyberattack Against Iran Part of Ongoing Campaign

Iran’s steel manufacturing sector is sufferer to ongoing cyberattacks that formerly impacted the country’s rail system. Malware utilised in a crippling cyberattacks from an Iranian metal crops final …

Latest Cyberattack Against Iran Part of Ongoing CampaignRead More

google patches actively exploited chrome bug

Google Patches Actively Exploited Chrome Bug

The heap buffer overflow issue in the browser’s WebRTC engine could make it possible for attackers to execute arbitrary code. When persons have been celebrating the Fourth of July holiday in the …

Google Patches Actively Exploited Chrome BugRead More

zuorat can take over widely used soho routers

ZuoRAT Can Take Over Widely Used SOHO Routers

Products from Cisco, Netgear and others at risk from the multi-phase malware, which has been lively considering the fact that April 2020 and reveals the work of a advanced menace actor. A novel …

ZuoRAT Can Take Over Widely Used SOHO RoutersRead More

a guide to surviving a ransomware attack

A Guide to Surviving a Ransomware Attack

Oliver Tavakoli, CTO at Vectra AI, presents us hope that surviving a ransomware attack is possible, so extensive as we apply preparing and intentionality to our protection posture. Surviving …

A Guide to Surviving a Ransomware AttackRead More

security innovation: secure systems start with foundational hardware

Security Innovation: Secure Systems Start with Foundational Hardware

Security Innovation: Protected Units Commence with Foundational Hardware Some elements of this short article are sourced from: threatpost.com …

Security Innovation: Secure Systems Start with Foundational HardwareRead More

patchable and preventable security issues lead causes of q1 attacks

Patchable and Preventable Security Issues Lead Causes of Q1 Attacks

Attacks against U.S. corporations spike in Q1 2022 with patchable and preventable exterior vulnerabilities responsible for bulk of attacks. Eighty-two p.c of attacks on organizations in Q1 2022 …

Patchable and Preventable Security Issues Lead Causes of Q1 AttacksRead More

mitel voip bug exploited in ransomware attacks

Mitel VoIP Bug Exploited in Ransomware Attacks

Scientists alert menace actors are working with a novel remote code execution exploit to achieve initial access to victim’s environments. Ransomware groups are abusing unpatched versions of a …

Mitel VoIP Bug Exploited in Ransomware AttacksRead More

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Interim pages omitted …
  • Go to page 87
  • Go to Next Page »

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.