Author: Cybernoz

How Private Investigators Handle Digital Forensics?
21
May
2025

How Private Investigators Handle Digital Forensics?

The world we live in is packed with data. Texts, emails, social media posts, deleted files, you name it. And…

Anchore SBOM tracks software supply chain issues
21
May
2025

Anchore SBOM tracks software supply chain issues

Anchore announced the next phase of its SBOM strategy with the release of Anchore SBOM. With the addition of Anchore…

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
21
May
2025

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims

May 21, 2025Ravie LakshmananMalware / Artificial Intelligence Counterfeit Facebook pages and sponsored ads on the social media platform are being…

Ivanti vulnerability
21
May
2025

Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities

Cybersecurity firm Wiz says threat actors are actively exploiting in the wild two recently patched Ivanti Endpoint Manager Mobile (EPMM)…

Kettering Health
21
May
2025

Kettering Health hit by system-wide outage after ransomware attack

Kettering Health, a healthcare network that operates 14 medical centers in Ohio, was forced to cancel inpatient and outpatient procedures…

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected
21
May
2025

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected

The Acronis Threat Research Unit (TRU) has revealed an advanced campaign believed to be orchestrated by the SideWinder advanced persistent…

AI Prompt Injection Attacks
21
May
2025

Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks

Google DeepMind has developed an ongoing process to counter the continuously evolving threat from Agentic AI’s bete noir: adaptive indirect…

A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon
21
May
2025

A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon

When the news broke that a Chinese hacking group known as Salt Typhoon had penetrated multiple U.S. telecommunications networks, gained…

Cellcom Confirms Cybersecurity Breach After Network Failure
21
May
2025

Cellcom Confirms Cybersecurity Breach After Network Failure

Cellcom/Nsight has officially confirmed a cyberattack as the cause of a five-day service disruption affecting customers across its network. In…

How to Detect Phishing Attacks Faster: Tycoon2FA Example
21
May
2025

How to Detect Phishing Attacks Faster: Tycoon2FA Example

It takes just one email to compromise an entire system. A single well-crafted message can bypass filters, trick employees, and…

PowerSchool hacker pleads guilty
21
May
2025

US Student to Plead Guilty Over PowerSchool Hack

A Massachusetts student pleaded guilty in court to hacking two US companies and extorting them for ransom. One of the…

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog
21
May
2025

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known…