Author: Cybernoz

Coyote Banking Malware Weaponizing Windows LNK Files To Execute Malicious Scripts
31
Jan
2025

Coyote Banking Malware Weaponizing Windows LNK Files To Execute Malicious Scripts

A new wave of cyberattacks leveraging the Coyote Banking Trojan has been identified, targeting financial institutions in Brazil. This sophisticated…

Cisco’s Webex Chat Vulnerabilities Let Attackers Access Organizations Chat Histories
31
Jan
2025

Cisco’s Webex Chat Vulnerabilities Let Attackers Access Organizations Chat Histories

Cisco’s Webex Chat (formerly known as IMI Chat) was found to have a significant security flaw that exposed the sensitive…

Jane Devry
31
Jan
2025

Restoring SOC Team Confidence Amid Waves of False Positives

Imagine you’re a performer at a circus. You’re juggling balls, pins, torches, and the occasional chainsaw, all while blindfolded. Shouts…

Broadcom fixed information disclosure flaws in VMware Aria Operations
31
Jan
2025

Broadcom fixed information disclosure flaws in VMware Aria Operations

Broadcom fixed information disclosure flaws in VMware Aria Operations Pierluigi Paganini January 31, 2025 Broadcom patched five flaws in VMware…

Malware Found in Healthcare Patient Monitors Linked to Chinese IP Address
31
Jan
2025

Malware Found in Healthcare Patient Monitors Linked to Chinese IP Address

A critical cybersecurity vulnerability has been uncovered in Contec CMS8000 patient monitors, revealing embedded malware that poses significant risks to…

D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely
31
Jan
2025

D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been affecting DSL-3788 routers, allowing attackers to acquire complete control over…

Microsoft to Boost M365 Bounty Program With New Products & Rewards Up to $27,000
31
Jan
2025

Microsoft to Boost M365 Bounty Program With New Products & Rewards Up to $27,000

A significant extension of Microsoft’s Microsoft 365 (M365) Bounty Program has been announced. The program now includes new Viva products…

Jane Devry
31
Jan
2025

Is data minimization the new data ethics in subscription management?

Data could be your biggest asset but it could also be your weakest link. The more you collect, the more…

Infosec products of the month: January 2025
31
Jan
2025

Infosec products of the month: January 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute Security, Atsign, authID, BackBox,…

Authorities Take Down Cracked & Nulled Hacking Forums Used by 10 Million Users
31
Jan
2025

Authorities Take Down Cracked & Nulled Hacking Forums Used by 10 Million Users

In a law enforcement operation dubbed “Operation Talent,” an international coalition of law enforcement agencies led by Germany’s Bundeskriminalamt (BKA)…

Jane Devry
31
Jan
2025

5 cybersecurity practices for custom software development

Whether you are going to build a custom CRM system, custom ERP tool, or any other bespoke solution, you need…

Nine out of ten emails are spam
31
Jan
2025

Nine out of ten emails are spam

Now, more than ever, users can fall prey to word-perfect AI-created phishing campaigns, subtle BEC messages that sound remarkably like…