Home News Page 619

News

News from the cyber security world and abroad. Enjoy current affairs of the cyber underground and more. Browse popular news articles covering hackers and cybercrimnals alike. Discover new vulnerabilities and emerging threats that we cover. Looking for Malware or data breach related articles? Than the cyber post has all the cybersecurity information you can take in!

In addition to current affairs, we like to educate our readers. For instance, we have a learning section. Head over to our educational section and enjoy. Read some great tips and articles for securing your accounts and data. Protect yourself from phishing and basic password vulnerabilities. Looking for something more exciting to read? Than maybe some darknet stories will tickle your fancy. But sit back and enjoy exciting cybercrime stories from the darkweb. Learn of arrests and the data that carders and fraudsters peddle in.

Critical Libgcrypt Crypto Bug Opens Machines to Arbitrary Code

0
The flaw in the free-source library could have been ported to multiple applications. The Libgcrypt project has rushed out a fix for a critical bug in version 1.9.0 of the...

Lazarus Affiliate ‘ZINC’ Blamed for Campaign Against Security Researcher

0
New details emerge of how North Korean-linked APT won trust of experts and exploited Visual Studio to infect systems with ‘Comebacker’ malware. Microsoft has attributed a recently discovered campaign...

Hezbollah-Linked Lebanese Cedar APT Infiltrates Hundreds of Servers

0
Enhanced Explosive RAT and Caterpillar tools are at the forefront of a global espionage campaign. Advanced persistent threat (APT) group Lebanese Cedar has compromised at least 250 public-facing servers since...

LIVE Webinar: Major Lessons to be Learned from Top Cyber Attacks in 2020

0
By: The Hacker News We likely all agree that 2020 was a year we won't soon forget - for many reasons. One area particularly impacted last year was (and continues...

Rocke Group’s Malware Now Has Worm Capabilities

0
The Pro-Ocean cryptojacking malware now comes with the ability to spread like a worm, as well as harboring new detection-evasion tactics. Researchers have identified an updated malware variant used by...

Cleaning up after Emotet: the law enforcement file

0
Following global law enforcement action to take over the Emotet botnet, a special update is being sent to clean up infected machines. This blog post was authored by Hasherezade...
dark reading threat intel and cybersecurity news

Ransomware Payoffs Surge by 311% to Nearly $350 Million

0
Payments to ransomware gangs using cryptocurrency more than quadrupled in 2020, with less than 200 cryptocurrency wallets receiving 80% of funds.Ransomware payments using cryptocurrency surged 311% in 2020, nearing...

Well-Known Fake ID Vendor Arrested in Germany

0
German Federal Police arrested a trio suspected of running the “FakeIDDobby” vendor account on several darkweb marketplaces.A press release by the Federal Police Inspection for Combating Crime in Halle...

Industrial Gear at Risk from Fuji Code-Execution Bugs

0
Fuji Electric’s Tellus Lite V-Simulator and V-Server Lite can allow attackers to take advantage of operational technology (OT)-IT convergence on factory floors, at utility plants and more. Industrial control software...