Author: Cybernoz

Critical Zimbra Vulnerabilities Let Attackers Unauthorized Access to Internal Resources
10
Feb
2025

Critical Zimbra Vulnerabilities Let Attackers Unauthorized Access to Internal Resources

Zimbra Collaboration, a popular open-source email and collaboration software, was recently discovered to include critical vulnerabilities that pose serious risks…

Linux Kernel 6.14-rc2 Released - What's Newly Added !
10
Feb
2025

Linux Kernel 6.14-rc2 Released – What’s Newly Added !

Linus Torvalds, lead developer of the Linux kernel, announced the second release candidate (rc2) of Linux Kernel 6.14, providing developers…

Naveen Goud
10
Feb
2025

Details on Home Office Apple iCloud access and FBI message scam alert

UK Home Office Seeks Access to Apple iCloud Accounts The Home Office of the United Kingdom, a key ministerial authority…

Open Graph Spoofing Toolkit Fuels Phishing Attacks
10
Feb
2025

Open Graph Spoofing Toolkit Fuels Phishing Attacks

Cyble Research and Intelligence Labs (CRIL) highlighted the growing misuse of the Open Graph Spoofing Toolkit, a dangerous tool designed…

Massive Brute Force Attack Targets VPN and Firewall Logins Using 2.8 Million IPs
10
Feb
2025

Massive Brute Force Attack Targets VPN and Firewall Logins Using 2.8 Million IPs

A global brute force attack campaign leveraging 2.8 million IP addresses actively targets edge security devices, including VPNs, firewalls, and…

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data
10
Feb
2025

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data

Serious vulnerabilities in Zimbra Collaboration Suite (ZCS), a popular enterprise email and collaboration platform, have raised alarm in the cybersecurity…

Naveen Goud
10
Feb
2025

What is a Seed Phrase Cyber Attack?

In the growing world of cryptocurrency and digital assets, security is a top concern. One of the most significant risks…

Political campaigns struggle to balance AI personalization and voter privacy
10
Feb
2025

Political campaigns struggle to balance AI personalization and voter privacy

In this Help Net Security interview, Mateusz Łabuz, researcher at the IFSH, discusses the balance between using AI for personalized…

Pentera Header
10
Feb
2025

A Cybersecurity Leader’s Guide to SecVal in 2025

For many security leaders security validation has become a top priority. After the introduction of the Continuous Threat Exposure Management…

Hackers Exploiting Google Tag Manager To Steal Credit Card From eCommerce Sites
10
Feb
2025

Hackers Exploiting Google Tag Manager To Steal Credit Card From eCommerce Sites

Hackers have been exploiting Google Tag Manager (GTM) to steal sensitive credit card information from eCommerce sites, particularly those built…

Tor Browser 14.0.6 Released, What’s New!
10
Feb
2025

Tor Browser 14.0.6 Released, What’s New!

Free Webinar – Supply Chain Attack Prevention Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers….

February 2025 Patch Tuesday forecast: New directions for AI development
10
Feb
2025

February 2025 Patch Tuesday forecast: New directions for AI development

The new year has started with a whirlwind of activity, and one of the hottest topics in the news is…