© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

Emotet: the rise and fall of a criminal empire

The Emotet banking trojan has been active at least since 2014, with the botnet being operated by the Russian cybercrime organization tracked as TA542....
Read more about Emotet: the rise and fall of a criminal empire

10 APT groups that joined the MS Exchange exploitation party

At least five advanced threat actors (APTs) were exploiting the Microsoft Exchange servers before the company released patches. After Microsoft...
Read more about 10 APT groups that joined the MS Exchange exploitation party

Research: 19 petabytes of data exposed across 29,000+ unprotected databases

CyberNews researchers found that more than 29,000 databases worldwide are still completely unprotected and publicly accessible, leaving close to 19,000...
Read more about Research: 19 petabytes of data exposed across 29,000+ unprotected databases

Unpatched and unprotected: more than 80,000 PHP servers are vulnerable to cyberattacks

2
CyberNews researchers found more than 80,000 servers worldwide still running on outdated versions of PHP that are susceptible to hundreds...
Read more about Unpatched and unprotected: more than 80,000 PHP servers are vulnerable to cyberattacks

APT in action: XDSpy and Sandworm

Numerous advanced persistent threat (APT) groups have been attacking governments and the private sector. Some of them operated undetected for...
Read more about APT in action: XDSpy and Sandworm

Katie Moussouris about cyberespionage: it is getting a lot muddier

Foes like Russia are now using cyber tools not purely for cyber espionage but exploit them down the road for...
Read more about Katie Moussouris about cyberespionage: it is getting a lot muddier

Is Roblox secure? Static analysis reveals subpar security practices on Roblox Android app

Updated on 03/05. We updated the article with a response Roblox made public in regards to our report. Our investigation...
Read more about Is Roblox secure? Static analysis reveals subpar security practices on Roblox Android app

Honeypots: how security teams use bait to protect against cyber threats

A honeypot is a security mechanism designed to lure attackers in a specially crafted virtual trap. Honeypots intentionally appear to...
Read more about Honeypots: how security teams use bait to protect against cyber threats

2020 was the year of phishing, with a jump of 510% in the first two months alone

A new report shows a staggering 34.4% increase in phishing attacks in the last year. 2020 was a bad year...
Read more about 2020 was the year of phishing, with a jump of 510% in the first two months alone

How to secure cyber-physical supply chains

The merging of digital and physical domains is a central part of the digital transformation we're going through as part...
Read more about How to secure cyber-physical supply chains

Careless love? 15% of people use pet names as password

Human affection for animal companions knows no bounds. But maybe it should, as research shows that thousands of people put...
Read more about Careless love? 15% of people use pet names as password

Million-dollar deposits and friends in high places: how we applied for a job with a ransomware gang

During an undercover interview, a CyberNews researcher tricked ransomware operators affiliated with Ragnar Locker into revealing their ransom payout structure,...
Read more about Million-dollar deposits and friends in high places: how we applied for a job with a ransomware gang

Facebook Messenger users hit by scammers in over 80 states

Over 1,000 fake Facebook accounts were discovered in a large-scale scam aimed at Facebook Messenger users in over 80 countries...
Read more about Facebook Messenger users hit by scammers in over 80 states

Deterrence in cybersecurity is no longer enough. Here’s why

A new study from MIT argues that modern organizations require a more proactive approach to cybersecurity. When we think of...
Read more about Deterrence in cybersecurity is no longer enough. Here’s why

Scammers are capitalizing on our desire to get away

Watch out - malicious domains targeting travelling are on the rise. After more than a year of rolling lockdowns, and...
Read more about Scammers are capitalizing on our desire to get away

Over 380 thousand IP cameras might be easily accessible worldwide, with the US and Germany in the lead

Ubiquitous video surveillance has become the hallmark of the century, with millions of eyes behind billions of ever-present cameras constantly...
Read more about Over 380 thousand IP cameras might be easily accessible worldwide, with the US and Germany in the lead

Cybersecurity in a post-pandemic world

With mass vaccination ramping up and the possible end of the pandemic in sight, it’s time to look at how...
Read more about Cybersecurity in a post-pandemic world

Cheapest tool to kill satellites? A computer

Military presence in space is an expensive endeavor, usually reserved for wealthy nations. Countries lacking in resources, however, might employ...
Read more about Cheapest tool to kill satellites? A computer

“Not ideal” from a privacy standpoint: Clubhouse API lets “anyone” scrape public user data

According to Clubhouse, anyone can access its users' profile information via the invite-only app, while its API appears to allow...
Read more about “Not ideal” from a privacy standpoint: Clubhouse API lets “anyone” scrape public user data

Clubhouse data leak: 1.3 million scraped user records leaked online for free

2
So far, it seems like it’s been the worst week of the year for social media platforms in terms of...
Read more about Clubhouse data leak: 1.3 million scraped user records leaked online for free