Home News Security Page 415

Security

Security news and articles from the cyber world. Enjoy exciting cyber security stories and news articles updated daily. The Cyber Post brings you the latest updates on cybersec. Therefore, we cover categories from hackers to exploits and vulnerabilities.

So learn how to secure your computer, your data and your own personal identity. If that is not enough than check out some articles on how to protect the cloud environment. Maybe you are looking for information regarding exploits and current vulnerabilities? Even more the cyber post has tons of information on the latest vulnerabilities.

North Korean Hackers target UN Security Members

0
New UN Security Council report reveals repeated targeting of UN Security Council officials over the past year By Catalin Cimpanu  Today's security threats have expanded in scope and seriousness. There can now...

Foreign Hackers Disrupt Texas County Email System, Raising Concerns For the Election

0
By Jack Gillum, Jessica Huseman, Jeff Kao and Derek Willis The malware attack, which sent fake email replies to voters and businesses, spotlights an overlooked vulnerability in counties that don’t follow best practices...

Ransomware, Phishing & Unpatched VPNs Highlighted in New Microsoft Report

0
By Kurt Mackie Microsoft on Tuesday announced the release of its "Digital Defense Report," which is described as "a reimagining" of Microsoft's "Security Intelligence Report" (SIR). The "Digital Defense Report" is an annual publication...

MFA-Minded Attackers Continue to Figure Out Workarounds

0
While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue. By: Robert Lemos As online users become increasingly aware of and use multifactor authentication (MFA),...

Google removes 16 malicious apps from play store found to be part of the...

0
After removing six apps infected with the Joker malware earlier in Sep, Google has now removed 16 more apps from its Play Store. The Joker malware, a billing-fraud strain of...

WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance

0
The AES-GCM-256 key is stored and generated by WhatsApp server and is sent to the client. When a user signs in to new device, it retrieves the key from the server...

FBI and CISA Warn Malicious Actors Could Exploit Mail In Voting

0
By: Kyle Fedorek A joint statement released by the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday warns that foreign actors and cybercriminals are likely to exploit...

Tor Zero Days And Malicious Exit Nodes

0
Multiple zero-day vulnerabilities in Tor have been disclosed online as well as a malicious exit node operator stealing bitcoin and other nefarious activities. A security researcher has disclosed two zero-days...

Ethereum Classic 51% Attack and Investigation Into Stolen Millions.

0
August 8th 2020 ETHEREUM CLASSIC 51% ATTACK INVESTIGATION After attacking the Ethereum classic chain on July 31, 2020, the same Attacker attacked the ETC chain again yesterday. The massive reorganization of 4236...

Major Twitter Hack – Hackers Run Bitcoin Scam Using Celebrity and Verified Accounts

0
By Kyle Fedorek 2020 has been one heck of a year. From COVID-19 to real world issues and the presidential debate. It seems just when you think it cant get...