Author: Cybernoz

Apple
10
Feb
2025

Apple fixes zero-day exploited in ‘extremely sophisticated’ attacks

Apple has released emergency security updates to patch a zero-day vulnerability that the company says was exploited in targeted and…

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution
10
Feb
2025

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years, that could allow attackers to execute…

Quishing via QR Codes Emerging As a Top Attack Vector Used by Hackers
10
Feb
2025

Quishing via QR Codes Emerging As a Top Attack Vector Used by Hackers

QR codes have become an integral part of our digital lives, offering quick access to websites, services, and even payment…

US Funding Cuts Are Helping Criminals Get Away With Child Abuse and Human Trafficking
10
Feb
2025

US Funding Cuts Are Helping Criminals Get Away With Child Abuse and Human Trafficking

Over the years, the programs have been effective. For instance, a four-year partnership between the US and the Philippines, which…

New Report of of 1M+ malware samples Show Application Layer Abused for stealthy C2
10
Feb
2025

New Report of of 1M+ malware samples Show Application Layer Abused for stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed a growing trend in the exploitation…

Newspaper printer
10
Feb
2025

Cyberattack disrupts Lee newspapers’ operations across the US

Lee Enterprises, one of the largest newspaper groups in the United States, says a cyberattack that hit its systems caused…

8Base Ransomware Dark Web Site Seized, Four Operators Arrested
10
Feb
2025

8Base Ransomware Dark Web Site Seized, Four Operators Arrested

In a significant breakthrough against global cybercrime, Thai authorities announced today the arrest of four European nationals linked to the…

SHA256 Hash Calculation from Data Chunks
10
Feb
2025

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity and authenticity. It processes input data…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
10
Feb
2025

A suicide reveals the lonely side of AI chatbots, with Courtney Brown (Lock and Code S06E03)

Today on the Lock and Code podcast… In February 2024, a 14-year-old boy from Orlando, Florida, committed suicide after confessing…

Hackerone logo
10
Feb
2025

Gain Actionable, Data-backed Insights with HackerOne Recommendations

Meet HackerOne Recommendations: a built-in intelligence layer that continuously refines your security program, delivering personalized insights and your program’s historical performance….

Police arrest
10
Feb
2025

Police arrests 4 Phobos ransomware suspects, seizes 8Base sites

A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in…

12K+ KerioControl Firewall Instances Vulnerable to 1-Click RCE Exploit
10
Feb
2025

12K+ KerioControl Firewall Instances Vulnerable to 1-Click RCE Exploit

A critical security vulnerability, CVE-2024-52875, has been identified in GFI KerioControl firewalls, affecting versions 9.2.5 through 9.4.5. This flaw, which…