Home News Security Page 416

Security

Security news and articles from the cyber world. Enjoy exciting cyber security stories and news articles updated daily. The Cyber Post brings you the latest updates on cybersec. Therefore, we cover categories from hackers to exploits and vulnerabilities.

So learn how to secure your computer, your data and your own personal identity. If that is not enough than check out some articles on how to protect the cloud environment. Maybe you are looking for information regarding exploits and current vulnerabilities? Even more the cyber post has tons of information on the latest vulnerabilities.

ZOOM Zero-Day Vulnerability Allows Remote Code Execution

0
A zero-day vulnerability in Zoom for Windows may be exploited by an attacker to execute arbitrary code on a victim’s computer. The attack doesn’t trigger a security warning and...

WastedLocker Ransomware Using Hacked Websites to Spread via Fake Software Updates

0
Dozens of US news sites hacked in WastedLocker ransomware attacks By Sergiu Gatlan Image: C Drying The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect...

Palo Alto Networks disclose major bug that lets hackers bypass authentication on its firewall...

0
US Cyber Command says foreign hackers will most likely exploit new PAN-OS security bug By Catalin Cimpanu for Zero Day US Cyber Command said today that foreign state-sponsored hacking groups are likely to exploit...

Hacking Group CryptoCore Has Stolen Over 200 Million From Cryptocurrency Exchanges

0
Researchers from the Israeli company ClearSky  talked about the hacker group CryptoCore , active since 2018 and specializing in hacking cryptocurrency exchanges. According to experts, the group is based somewhere in Eastern...

Google Analytics Used By Cybercriminals to Steal Credit Card Data

0
Attackers inject malicious code that collects payment data onto a hacked site. Cybercriminals use Google Analytics to steal credit card information from compromised e-commerce sites. According to experts from Kaspersky Lab,...

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

0
Experts cautioned that problems in the GPRS Tunneling Protocol (GTP) could affect the operation of 4G and 5G networks. In reports published  last week  and in  December 2019, Positive Technologies and A10 Networks described...

Amazon Stops Largest DDoS Ever Recorded By Their Systems

0
Amazon says it mitigated the largest DDoS attack ever recorded By @JonPorty  Jun 18, 2020, 7:31am EDT An attack with a previously unseen volume of 2.3 Tbps Amazon Web Services recently had to defend...

FBI Reveals Cryptocurrency Hacks & Cyebrcrime Rose 75% During COVID-19 Pandemic

0
KEY POINTS Online crime increased by 75% during the COVID-10 pandemicSome of the crimes are enabled by cryptocurrencies, due to which increased regulations are being proposedWork-from-home employees are targeted by...

Misconfigured Kubernetes Target Of XMRig Mining Campaign

0
XMRig Campaign Target Misconfigured Kubernetes to Mine Cryptocurrency Kubernetes clusters, due to their cloud computing capabilities and widespread use, are the perfect target for crypto-mining campaigns. A widespread XMRig Monero-mining...

Air gapped hacking becoming a treasure trove of data for Hackers

0
Air-Gapped Systems are Becoming a Treasure Trove for Attackers For years, air-gapping has been recommend as a standard cybersecurity practice to protect sensitive systems and networks. Often, organizations isolate their...
Error decoding the Instagram API json