Playing with fire: millions of .git folders exposed to public

Continue reading


@cybernews.com | 1 year ago

DJI drone tracking data exposed in US

Continue reading


@cybernews.com | 1 year ago

Former Uber CSO found guilty of data breach cover up

Continue reading


@cybernews.com | 1 year ago

Cyberwar against Russia is creating a risky legal precedent, says expert

Continue reading


@cybernews.com | 1 year ago

Revolut breach: personal and banking data exposed

Continue reading


@cybernews.com | 1 year ago

Users soon won’t be able to buy books on five Kindle models:security is to blame

Five models of Kindle – popular e-reader devices – are becoming outmoded, losing support from their manufacturer, and essentially being prevented from downloading new books. | Continue reading


@cybernews.com | 1 year ago

Meta’s new AI chatbot exposes anti-semite, homophobic views

It took mere days before users outed Meta's BlenderBot3 as a homophobe obsessed with Donald Trump that harbors anti-semitic views. | Continue reading


@cybernews.com | 1 year ago

Novel CloudMensis spyware targets Apple macOS users

Malware researchers dubbed CloudMensis use cloud storage to exfiltrate documents, keystrokes, and screen captures from compromised Macs. | Continue reading


@cybernews.com | 1 year ago

Open dataset leaves job seekers from Eastern European at risk

International job search engine Jooble.org put itself and its clients in peril by leaving a 470GB database unprotected. | Continue reading


@cybernews.com | 1 year ago

Exposed: The threat actors who are poisoning Facebook

An investigation of the notorious Is That You? scam led our researchers to a hidden cybercriminal stronghold. | Continue reading


@cybernews.com | 1 year ago

Why can't Russians hack Starlink satellites?

Safety measures that make the Starlink satellite constellation safe against attacks might be short-lived. | Continue reading


@cybernews.com | 1 year ago

Nord Security raises outside capital of 100M at 1.6B Valuation

Internet privacy and security company Nord Security said it is after a more holistic approach to online security. | Continue reading


@cybernews.com | 2 years ago

Ukraine hackers target GLONASS for cyberattacks

Ukraine's 'IT army' announced it would target the Russian satellite-based navigation system. | Continue reading


@cybernews.com | 2 years ago

89% of Global cyberattacks are aimed at Russia or Ukraine

Nearly nine in ten cyberattacks happening worldwide are targeting Russia or Ukraine, the recent research by Atlas VPN finds. | Continue reading


@cybernews.com | 2 years ago

Underworld Trends – Criminals Adopt DDoS Attacks for Extortion

Threat actors increasingly couple malware with DDoS attacks for extortion. | Continue reading


@cybernews.com | 2 years ago

Suspect in $70M ransomware-attack Extradited to the US

A 22-year-old REvil ransomware affiliate is suspected to be behind the attack with an initial ransom demand of $70 million. | Continue reading


@cybernews.com | 2 years ago

Malware bot Hijacks email-threads

Cunning botnet burrows into legitimate email threads to lure victims into clicking on malicious links, in the mistaken belief that they are emailing a friend. | Continue reading


@cybernews.com | 2 years ago

Governments spend Millions to destroy SSD's

Up to $17 million are spent on the physical destruction of solid-state drives (SSD). | Continue reading


@cybernews.com | 2 years ago

Long-awaited Kaspersky leak doesn't seem to be a Leak at all

The so-called leak contains only information about Kaspersky that is or at some point was already publicly available. | Continue reading


@cybernews.com | 2 years ago

The Iron Curtain – Which IT Services Got-Blocked or Left the Russian Market?

Whether by the Kremlin’s order or following a wave of companies voluntarily leaving the Russian market, many organizations stopped operating on the territory of the Russian Federation. | Continue reading


@cybernews.com | 2 years ago

Open Database leaves major Chinese shipping-Ports exposed to shipping-chaos

Cybernews has discovered that digital freight logs, probably belonging to Nanjing and Zhangjiagang, have been leaking data, with potentially hazardous consequences for international trade. | Continue reading


@cybernews.com | 2 years ago

Romanian-gas-giant-hacked-and-held-to-ransom

Rompetrol has been forced to suspend services at gas stations across the country, while the Hive cybercriminal group is demanding $2m to return data it stole and encrypted during the attack. | Continue reading


@cybernews.com | 2 years ago

Anonymous declares cyberwar against Russia

The Anonymous hacker collective launched a cyberwar against Russia as Putin’s forces closed in on Ukraine’s capital Kyiv. | Continue reading


@cybernews.com | 2 years ago

Anonymous leaks database of the Russian Ministry of Defence

On Friday evening, Anonymous claimed they managed to breach the database belonging to the Russian Ministry of Defence. | Continue reading


@cybernews.com | 2 years ago

Hackers are now dropping malware into SSD drives through firmware updates

Academics have outlined how solid-state drives (SSDs) can be cracked open with malware that goes beyond the reach of traditional antivirus scanning and user access. | Continue reading


@cybernews.com | 2 years ago

Sky.com Servers Exposed via Misconfiguration

A misconfigured file contained production-level database access credentials, as well as addresses to development endpoints. | Continue reading


@cybernews.com | 2 years ago

Popular Android apps with 142.5M downloads leak user data

Top Android apps downloaded by more than 140 million people leak user data, potentially including users’ names, emails, usernames, and more. | Continue reading


@cybernews.com | 2 years ago

‘Amazon’s Choice’ best-selling TP-Link router ships with vulnerable firmware

We found numerous security flaws in TP-Link router firmware, which may put owners at risk of cyberattacks attacks. | Continue reading


@cybernews.com | 2 years ago

Cloud neutrality: have cloud providers become too powerful?

As entire industries quickly move to the cloud, more people rely on three leading cloud service providers. Should we be worried? | Continue reading


@cybernews.com | 2 years ago

We Applied for a Job with a Ransomware Gang

We spoke with threat actors who were running a Ragnar Locker ransomware affiliate operation for more than a decade. | Continue reading


@cybernews.com | 3 years ago

CD Projekt Red has GWENT source code leaked after ransomware attack

CD Project Leak #1 sees Cyberpunk 2077 maker's GWENT source code leaked after suffering a ransomware attack. More leaks have been promised. | Continue reading


@cybernews.com | 3 years ago

The Oldsmar water facility hack was avoidable – and it can happen again

Last year, we warned that critical US infrastructure was easy to hack by anyone. Last Friday, it happened in Oldsmar, Florida. | Continue reading


@cybernews.com | 3 years ago

Critical US infrastructure can be hacked by anyone (July 2020)

Our research found that both public and private infrastructure in the US is still unprotected and easily accessible to hackers - with no passwords at all. | Continue reading


@cybernews.com | 3 years ago

Parler CEO John Matze says he was fired by board

The board of Parler, a social media platform backed by Republican Party donor Rebekah Mercer and favored by U.S conservatives, has fired its CEO John Matze. | Continue reading


@cybernews.com | 3 years ago

Largest compilation of emails and passwords leaked for free on public forum

More than 3.2 billion unique pairs of plain text emails and passwords have been leaked for free. This makes it the largest compilation ever. | Continue reading


@cybernews.com | 3 years ago

Hackers leverage sophisticated and novel techniques to break into networks

Malicious actors exploited the COVID-19 to the fullest, and attacks on such security bastions as FireEye left many cybersecurity experts uneasy. | Continue reading


@cybernews.com | 3 years ago

70TB of Parler users’ messages, videos, and posts leaked by security researchers

Parler has been hit by a massive data scrape. Security researchers collected swaths of user data before the network went dark Monday morning. | Continue reading


@cybernews.com | 3 years ago

Coolest custom mechanical keyboards we’ve ever seen

These are the coolest custom mechanical keyboards we've ever seen. Hear from their creators how you they made them so you can get inspired | Continue reading


@cybernews.com | 3 years ago

Are Walmart, Amazon and eBay liable for selling vulnerable devices?

Our research showed that routers sold by Walmart and Amazon were vulnerable, which raises questions about these companies' legal liabilities. | Continue reading


@cybernews.com | 3 years ago

Walmart router, others on Amazon, eBay have hidden backdoors to control devices

Walmart-exclusive Jetstream routers and Wavlink routers contain hidden backdoors. The routers are actively being exploited by Mirai malware | Continue reading


@cybernews.com | 3 years ago

We infiltrated an IRC botnet. Here’s what we found

After detecting an attempt to infect one of our systems, our curiosity led us to a potentially much bigger cybercrime operation. | Continue reading


@cybernews.com | 3 years ago

Trump says nobody gets hacked, gets hacked twice in one week

President Trump’s campaign website was briefly hacked on Tuesday morning, just a week after he claimed that “nobody gets hacked.” | Continue reading


@cybernews.com | 3 years ago

Japan to join forces with U.S., Europe in regulating Big Tech firms

Japan will join forces with the United States and Europe to take on any market abuses by the four Big Tech companies. | Continue reading


@cybernews.com | 3 years ago

Marketing agency for NFL, MasterCard, MLB, SoundCloud exposes clients’ data

CyberNews research discovered that teamDigital was publicly exposing the sensitive data of their clients – NFL, MLB, Mastercard and more. | Continue reading


@cybernews.com | 3 years ago

Court orders seizure of ransomware botnet controls as U.S. election nears

Microsoft seized a series of internet protocol addresses hosted by U.S. companies that had been directing activity on computers infected with Trickbot. | Continue reading


@cybernews.com | 3 years ago

How fictional is the Black Mirror dystopia?

Black Mirror is a dystopian science fiction TV series about our dependence on social media and technology. Is it really fiction, though? | Continue reading


@cybernews.com | 3 years ago

Deanonymization of police officers in Belarus could be a game-changer

Belarus cyber guerillas leaked the personal information of 2,000 high-ranking Belarus officials and promised to keep doing so if arrests continue. | Continue reading


@cybernews.com | 3 years ago

EU official: the internet was not built for cybersecurity

Cybersecurity should not come at the price of losing internet freedom, experts at the EU Cyber Forum said. | Continue reading


@cybernews.com | 3 years ago