Author: Cybernoz

Dutch university recovered ransomware payment with a $300k profit | Cybernews
05
Feb
2025

Dutch university recovered ransomware payment with a $300k profit | Cybernews

Even though the authorities recovered only a fraction of the payment made in Bitcoin three years ago, the victim made…

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code
05
Feb
2025

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code

A critical vulnerability, CVE-2025-23114, has been discovered within the Veeam Updater component that poses a serious risk to organizations utilizing…

Is voice recognition another biometric surveillance tool? | Cybernews
05
Feb
2025

Is voice recognition another biometric surveillance tool? | Cybernews

Considering the alarm bells around biometric surveillance tech, should we be concerned about the popularity of voice technology? In 2002,…

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
05
Feb
2025

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers,…

OpenNHP: Cryptography-driven zero trust protocol
05
Feb
2025

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data….

North Korea backing healthcare ransom attacks in US
05
Feb
2025

North Korea backing healthcare ransom attacks in US

Cybercriminal groups linked to the rogue state have been using Maui ransomware to attack healthcare and public health organizations in…

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code
05
Feb
2025

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code

The Google Chrome team has officially released Chrome 133, now available on the stable channel for Windows, Mac, and Linux….

Microsoft records a phishing campaign targeting over 10k organizations | Cybernews
05
Feb
2025

Microsoft records a phishing campaign targeting over 10k organizations | Cybernews

Threat actors behind a large-scale phishing campaign stole passwords, hijacked a user’s sign-in session, and were able to circumvent the…

More destructive cyberattacks target financial institutions
05
Feb
2025

More destructive cyberattacks target financial institutions

Financial institutions will continue to be the ultimate targets for criminals and threat actors, as a successful attack offers a…

Power of deepfakes: three times the world fell for dangerous fakes | Cybernews
05
Feb
2025

Power of deepfakes: three times the world fell for dangerous fakes | Cybernews

Deepfakes are more than silly games and pranks. At least on five accounts, they almost had the power to change…

AMD SEV Vulnerability Allows Malicious CPU Microcode Injection as Admin
05
Feb
2025

AMD SEV Vulnerability Allows Malicious CPU Microcode Injection as Admin

AMD has disclosed a high-severity vulnerability (CVE-2024-56161) in its Secure Encrypted Virtualization (SEV) technology, which could allow attackers with administrative…

Phishers gang up on Amazon Prime Day customers | Cybernews
05
Feb
2025

Phishers gang up on Amazon Prime Day customers | Cybernews

Amazon Prime Day 2022, an annual deal event on July 12-13 exclusively for Prime members, is a goldmine for phishers….