News

Cyber Security Reviews NEWS brings you the latest daily updates on trends and happenings around the globe.

0 Comments
European airplane maker Airbus admitted yesterday a data breach of its “Commercial Aircraft business” information systems that allowed intruders to gain access to some of its employees’ personal information. Though the company did not elaborate on the nature of the hack, it claimed that the security breach did not affect its commercial operations. So, there’s
0 Comments
Many organizations are scrambling to understand the California Consumer Privacy Act of 2018, which the California legislature passed in June 2018. It will go into effect beginning Jan. 1, 2020. The California attorney general is responsible for enforcing the law. The California Consumer Privacy Act (CCPA) gives California residents many new rights regarding how their
0 Comments
Have you ever lost your important files, like memories or official documents, accidentally or maliciously? Adding more… when you even do not have any backup for the same. Unfortunate, right? We’ve all been there. Just last week I formatted my computer and later found that I didn’t have any backup for some recently saved important
0 Comments
It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security vulnerabilities/exploits. Security vendor Avast has released its PC Trends Report 2019 revealing that millions of users are making themselves vulnerable to cyber attacks by keeping
0 Comments
SIM swapping is reportedly on the rise. How do SIM swaps work, and what are the best ways to prevent it? Mobile phones are often an important part of two-factor authentication (2FA) processes, but they have certain security risks like ordinary single-factor password processes. For devices connected to cellular networks, SIM swaps can open a
0 Comments
China has blocked Microsoft-owned search engine Bing, the company confirmed after receiving complaints from users throughout the country who took to social media beginning late Wednesday to express concerns. So, Bing becomes the latest service to be shut down by Chinese government behind its so-called Great Firewall of China, which blocks thousands of websites originating
0 Comments
Magecart strikes again, one of the most notorious hacking groups specializes in stealing credit card details from poorly-secured e-commerce websites. According to security researchers from RiskIQ and Trend Micro, cybercriminals of a new subgroup of Magecart, labeled as “Magecart Group 12,” recently successfully compromised nearly 277 e-commerce websites by using supply-chain attacks. Magecart is the
0 Comments
The U.S. authorities have charged two Ukrainian hackers for hacking into the Securities and Exchange Commission’s EDGAR filing system and stealing sensitive market-moving reports of companies before their public release. EDGAR, or Electronic Data Gathering, Analysis, and Retrieval, is an online filing system wherein companies submit their financial filings. The system processes around 1.7 million
0 Comments
One major advantage of AI algorithms is their ability to rapidly find patterns across large data sets and to detect anomalies. At the simplest form, this involves creating a baseline model of what’s normal in an environment, and then flagging and investigating anomalies to that baseline, which could potentially be IoT threats. This can be
0 Comments
Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, that could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems. The vulnerabilities, assigned as CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866, actually resides in the “systemd-journald” service that collects information from
0 Comments
Security researchers have identified a global DNS hijacking campaign, which they say is likely the work of Iranian hackers. According to researchers from FireEye’s Mandiant Incident Response and Intelligence team, the DNS hijacking campaign targeted entities for the past two years across the Middle East and North Africa, Europe and North America “on an almost
0 Comments
The widespread popularity of SaaS applications, BYOD and millions of unsecure IoT devices has effectively eliminated the notion of a hardened perimeter where IT and security organizations can control access to their sensitive data. Software-defined perimeter (SDP) technology makes users and devices invisible and inaccessible to outside attacks. An alternative to VPN technology, SDP can