Security

How governments abuse social media and tech: fake apps and SMS threats

Social media and technology might work as a catalyst for an uprising like the one in Belarus or a revolution...
Read more about How governments abuse social media and tech: fake apps and SMS threats

Monitoring tool abused to spy on victims’ cloud infrastructure

Security researchers observed a group of attackers using a monitoring tool to gain visibility over their victims’ cloud infrastructure. At...
Read more about Monitoring tool abused to spy on victims’ cloud infrastructure

Cybersecurity in the sharing economy

Uber's failure to report a massive data breach in 2016 has, ironically, focused far more attention on the incident than...
Read more about Cybersecurity in the sharing economy

8 best cybersecurity podcasts for 2021

15
Keeping up with cybersecurity news is a full-time job – no one has time to wade through white papers or...
Read more about 8 best cybersecurity podcasts for 2021

Pandemic provides boost to cloud-based security

The COVID-19 pandemic has put a rocket behind the shift towards cloud-based security, as workers have moved en masse from...
Read more about Pandemic provides boost to cloud-based security

College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data

1
We recently discovered an unsecured Amazon S3 (Simple Storage Service) bucket, or database, containing nearly 1 million records of sensitive...
Read more about College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data

The Daily Mail asked us to hack their journalists. Here's what went wrong

The CyberNews team conducted an ethical hacking experiment in collaboration with The Daily Mail that involved trying to hack three...
Read more about The Daily Mail asked us to hack their journalists. Here's what went wrong

Online marketing company exposes 38+ million US citizen records

Following the 350 million email leak covered by CyberNews earlier in August, this is the second time this summer we encountered an Amazon bucket owned by an unidentified party and containing massive amounts of user data.
Read more about Online marketing company exposes 38+ million US citizen records

How cyberattacks happen: A tale of three major cyber breaches

Cyberattacks can strike seemingly from nowhere, but they all require some sort of way in. That can be a vulnerability in a pre-existing system that unsuspecting victims aren’t aware about, or it can be something more circumstantial.
Read more about How cyberattacks happen: A tale of three major cyber breaches

We hijacked 28,000 unsecured printers to raise awareness of printer security issues

13
Cybersecurity experts at Cybernews hijacked close to 28,000 unsecured printers worldwide and forced them to print out a guide on...
Read more about We hijacked 28,000 unsecured printers to raise awareness of printer security issues

Cybersecurity teams need a commercial mindset as we develop the ‘new normal’

The Covid-19 pandemic has created huge pressures for businesses across the world as they strive to retain some semblance of...
Read more about Cybersecurity teams need a commercial mindset as we develop the ‘new normal’

Evan Greer: facial recognition is a uniquely dangerous form of surveillance

6
Companies and governments are eager to get a hold of our sensitive biometric data, and we are not making it...
Read more about Evan Greer: facial recognition is a uniquely dangerous form of surveillance

Exposed FCM keys leaves billions of users open to mass spam and phishing notifications

2
The FCM exploit originally discovered by security researcher Abss seems to have hit Microsoft Teams as well....
Read more about Exposed FCM keys leaves billions of users open to mass spam and phishing notifications

Report shows IT professionals are dismayed by today’s security standards

The third-annual Cloud Threat Report from tech giant Oracle and consulting firm KPMG reminds us that even in these disruptive...
Read more about Report shows IT professionals are dismayed by today’s security standards

Most antivirus programs can’t detect new coronavirus malware that steals victims’ money, personal data

Additional reporting by Edvardas Mikalauskas As the COVID-19 pandemic was sweeping the world in spring, staying informed and up-to-date about...
Read more about Most antivirus programs can’t detect new coronavirus malware that steals victims’ money, personal data

Netflix is a phishing goldmine for cybercriminals

We all love Netflix – which leaves us open to being tricked. The amount of time we’ve spent scrolling through...
Read more about Netflix is a phishing goldmine for cybercriminals

Chinese apps: alternatives to TikTok, WeChat and other popular apps

2
It's a well-known fact that China is guilty of spying over its citizens. However, its reach doesn't stop there. The...
Read more about Chinese apps: alternatives to TikTok, WeChat and other popular apps

350 million decrypted email addresses left exposed on an unsecured server

The CyberNews research team uncovered an unsecured data bucket owned by an unidentified party, containing seven gigabytes worth of unencrypted...
Read more about 350 million decrypted email addresses left exposed on an unsecured server

Beware using postal and parcel apps

As we’re ordering more online, the attack vectors for hackers become more obviousCybercriminals know how to capitalize on changes in...
Read more about Beware using postal and parcel apps

270 million malware attacks occurred between January and March

While many parts of the economy are slowing down, hacking isn’t We’ve seen an unprecedented change in the world economy...
Read more about 270 million malware attacks occurred between January and March