Home News Page 668

News

News from the cyber security world and abroad. Enjoy current affairs of the cyber underground and more. Browse popular news articles covering hackers and cybercrimnals alike. Discover new vulnerabilities and emerging threats that we cover. Looking for Malware or data breach related articles? Than the cyber post has all the cybersecurity information you can take in!

In addition to current affairs, we like to educate our readers. For instance, we have a learning section. Head over to our educational section and enjoy. Read some great tips and articles for securing your accounts and data. Protect yourself from phishing and basic password vulnerabilities. Looking for something more exciting to read? Than maybe some darknet stories will tickle your fancy. But sit back and enjoy exciting cybercrime stories from the darkweb. Learn of arrests and the data that carders and fraudsters peddle in.

Ethereum Classic 51% Attack and Investigation Into Stolen Millions.

0
August 8th 2020 ETHEREUM CLASSIC 51% ATTACK INVESTIGATION After attacking the Ethereum classic chain on July 31, 2020, the same Attacker attacked the ETC chain again yesterday. The massive reorganization of 4236...

CIA Gets presidential Go Ahead From Trump For More Covert Cyber Operations

0
In 2018, US President Trump gave the CIA more powers to carry out covert cyber operations resulting in several hacks and data dumps from Iranian and Russian spy agencies. By Catalin...

Major Twitter Hack – Hackers Run Bitcoin Scam Using Celebrity and Verified Accounts

0
By Kyle Fedorek 2020 has been one heck of a year. From COVID-19 to real world issues and the presidential debate. It seems just when you think it cant get...

ZOOM Zero-Day Vulnerability Allows Remote Code Execution

0
A zero-day vulnerability in Zoom for Windows may be exploited by an attacker to execute arbitrary code on a victim’s computer. The attack doesn’t trigger a security warning and...

Conti Ransomware Using Unique Features To Cripple Networks With Blazing Fast Encryption

0
By Catalin Cimpanu for Zero Day A lesser-known ransomware strain known as Conti is using up to 32 simultaneous CPU threads to encrypt files on infected computers for blazing-fast encryption...

Inside A Ryuk Ransomware Attack: From Start To Finish

0
Security researchers map out how a ransomware attack plays out over a two week period. By Steve Ranger Security researchers have revealed the anatomy of a ransomware attack, showing how cyber criminals gained...

WastedLocker Ransomware Using Hacked Websites to Spread via Fake Software Updates

0
Dozens of US news sites hacked in WastedLocker ransomware attacks By Sergiu Gatlan Image: C Drying The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect...

LEADTOOLS Remote Code Execution Vulnerability

0
WEDNESDAY, JULY 1, 2020 Vulnerability Spotlight: Remote code execution vulnerabilities in LEADTOOLS 20 Cory Duplantis of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a remote code...

Palo Alto Networks disclose major bug that lets hackers bypass authentication on its firewall...

0
US Cyber Command says foreign hackers will most likely exploit new PAN-OS security bug By Catalin Cimpanu for Zero Day US Cyber Command said today that foreign state-sponsored hacking groups are likely to exploit...

European bank Hit By Biggest Packets per Second DDoS

0
Biggest-ever packets-per-second DDoS attack hits large European bank Author: Rene Millman A large European bank suffered a huge DDoS attack earlier this week, according to a new report by Akamai. The...
Error decoding the Instagram API json