What is Malware and its types?
Virtualattacks | It's News About Next Generation of Cyber Security
by Priyanshu Vijayvargiya
3M ago
The term “malicious software” is shortened to “malware.” Malware is invasive software that is purposefully created to harm computers and computer networks. On the other hand, software that unintentionally causes harm is typically called a software bug. Occasionally, inquiries are made regarding the distinction between malware and viruses. The distinction is that ransomware, which encompasses various online threats such as viruses, spyware, adware, and ransomware, is referred to as malware. To put it simply, one kind of malware is a computer virus. Phishing, malicious attachments, malicious dow ..read more
Visit website
What is meant by “cybersecurity”?
Virtualattacks | It's News About Next Generation of Cyber Security
by Priyanshu Vijayvargiya
3M ago
The process of protecting networks, computers, servers, mobile devices, electronic systems, and data from malicious attacks is known as cybersecurity. It is also referred to as electronic information security or information technology security. The term can be categorized into a few common categories and is used in various contexts, including business and mobile computing. The process of safeguarding a computer network against trespassers, be they malevolent actors or malicious software, is known as network security. Application security aims to protect devices and software from attacks. The ..read more
Visit website
Waves of cyberattacks hit JPMorgan as scammers become “more devious”
Virtualattacks | It's News About Next Generation of Cyber Security
by Virtualattacks Staff
3M ago
In response to an increasing wave of cybercrime worldwide, JPMorgan Chase & Co. announced an increase in hacker attempts to compromise its systems. According to JPMorgan Chase, the amount of hacking attempts it stops every day has doubled from the previous year to about 45 billion. The alarming trend was disclosed by Mary Callahan Erdoes, the head of JPMorgan’s asset and wealth management division, during a panel discussion at the World Economic Forum in Davos, according to Bloomberg. Cybercriminals’ changing strategies were highlighted by Erdoes, who said, “The fraudsters get smarter, sav ..read more
Visit website
Researchers and universities are the target of Mint Sandstorm Apt
Virtualattacks | It's News About Next Generation of Cyber Security
by Priyanshu Vijayvargiya
3M ago
An Iranian threat group that has a reputation for using sophisticated espionage operations to target a wide range of organizations has recently targeted universities and research centers that concentrate on Middle Eastern issues in several different countries. In some of these cases, the group has deployed a new custom backdoor called MediaPI. The campaign, which started in November and has affected victims in the US, UK, Gaza, Israel, and other nations, has been monitored by Microsoft researchers. The campaign is the product of an attack team connected to Iran’s Islamic Revolutionary Guard Co ..read more
Visit website
Cybercriminals are demanding €11 million ransom from Calvià City Council
Virtualattacks | It's News About Next Generation of Cyber Security
by Priyanshu Vijayvargiya
3M ago
Ever since Saturday, a ransom of €11 million has been demanded by the hackers to restore access to a Majorca council computer network. The council will not be making up the difference, as stated by the mayor of Calvia, whose municipality includes the party resort of Magaluf. The frank statement from Juan Antonio Amengual was, “We cannot and do not want to pay blackmail sums to criminals.” The attack is believed to be the work of the cybercriminal group known as “Lockbit,” which has previously breached internal networks of the Chilean judiciary and other Spanish municipalities, including Sevill ..read more
Visit website
Thousands of Australians affected by ‘credential stuffing’ scam
Virtualattacks | It's News About Next Generation of Cyber Security
by Virtualattacks Staff
3M ago
After the theft of credit card details by hackers in a large-scale coordinated attack that affected thousands of online shoppers, Anthony Albanese has pledged to investigate all feasible measures to safeguard businesses against scams. Since November of last year, cybercriminals have targeted large businesses such as Dan Murphy’s, Event Cinemas, and Guzman Y Gomez, gaining fraudulent access to over 15,000 customer online accounts. Scammers made thousands of dollars in online purchases after buying the stolen login credentials from foreign cybercriminals. Customers who were impacted either had g ..read more
Visit website
Simple password resets could result in an account takeover due to a GitLab vulnerability
Virtualattacks | It's News About Next Generation of Cyber Security
by Virtualattacks Staff
3M ago
A password reset vulnerability in GitLab allows remote account takeover without user interaction. Due to a CVSS 10-scored bug, users of GitLab Community Edition (CE) and Enterprise Edition (EE) are advised to patch right away. According to a GitLab security release released on January 11, the DevOps platform added the ability to reset a password using a secondary email address on May 1, which is when the critical GitLab account takeover vulnerability was first discovered in version 16.1.0. “Account takeover can be achieved by crafting a specially formatted HTTP request that is capable of sendi ..read more
Visit website
A hacker creates a million virtual servers to mine cryptocurrency illegally
Virtualattacks | It's News About Next Generation of Cyber Security
by Priyanshu Vijayvargiya
3M ago
This week, a 29-year-old man from Ukraine was taken into custody for creating one million virtual servers through the use of compromised accounts, which were then used to mine $2 million in cryptocurrency. According to what Europol announced, the suspect is thought to be the brains behind a massive cryptojacking operation that involves stealing cloud computing resources in order to mine cryptocurrency. Cybercriminals can profit at the expense of compromised organizations by mining cryptocurrency on other people’s servers using their computational resources, which degrades the performance of th ..read more
Visit website
A Magic Keyboard Bug That Allowed Bluetooth Traffic Monitoring Was Fixed By Apple
Virtualattacks | It's News About Next Generation of Cyber Security
by Priyanshu Vijayvargiya
3M ago
A recently discovered Bluetooth keyboard injection issue, identified as CVE-2024-0230, was fixed by Apple with the release of Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory could use this flaw, which is a session management issue, to extract the Bluetooth pairing key and eavesdrop on Bluetooth conversations. “An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic.” reads the advisory published by the company. Marc Newlin from SkySafe found the vulnerability When an attacker is nea ..read more
Visit website
Halara looked into the breach after a hacker released 950,000 people’s data
Virtualattacks | It's News About Next Generation of Cyber Security
by Virtualattacks Staff
3M ago
After the purported data of nearly 950,000 customers was disclosed on a hacking forum, well-known athleisure clothing company Halara launched an investigation into a potential data breach. After being established in 2020, the Hong Kong company gained enormous popularity on TikTok thanks to the numerous videos it posted advertising its apparel. According to Halara, they are aware of reports of customer data being taken and disclosed online, and they are looking into possible security breaches. This comes after a person going by the handle “Sanggiero” posted a text file on a hacking forum and a ..read more
Visit website

Follow Virtualattacks | It's News About Next Generation of Cyber Security on FeedSpot

Continue with Google
Continue with Apple
OR