Author: Cybernoz

CISA Adds New Known Exploited Vulnerabilities To Catalog
05
Feb
2025

CISA Adds New Known Exploited Vulnerabilities To Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) Catalog by adding several new…

Hackers attack Israeli hotel reservation sites | Cybernews
05
Feb
2025

Hackers attack Israeli hotel reservation sites | Cybernews

Iranian-linked threat group Sharp Boys allegedly hacked at least five Israeli hotel reservation sites. “This connection is not private. This…

Hackers Can Exploit GPU Flaws to Gain Full Control of Your Device
05
Feb
2025

Hackers Can Exploit GPU Flaws to Gain Full Control of Your Device

Several critical vulnerabilities affecting Mali Graphics Processing Units (GPUs) have surfaced, allowing hackers to exploit flaws in GPU drivers to…

Jane Devry
05
Feb
2025

Giddy Up! It’s Time for Defense Tech Companies to Get Ahead of CMMC Before They Get Left Behind

Defense Tech companies that seek to maximize their chances of winning government contracts must understand current and future cybersecurity requirements….

Dynatrace strengthens cloud security posture management
05
Feb
2025

Dynatrace strengthens cloud security posture management

Dynatrace announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises managing…

International Civil Aviation Organization (ICAO)
05
Feb
2025

International Civil Aviation Organization (ICAO)

ICAO and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists Pierluigi Paganini February 05, 2025 The International Civil Aviation Organization…

Researchers Replicated DeepSeek’s R1-Zero Model for Just $30
05
Feb
2025

Researchers Replicated DeepSeek’s R1-Zero Model for Just $30

In an impressive demonstration of cost-effective AI research, a group of researchers has successfully replicated DeepSeek’s R1-Zero model for just…

Cybercriminals opt for deepfakes to apply for remote jobs | Cybernews
05
Feb
2025

Cybercriminals opt for deepfakes to apply for remote jobs | Cybernews

Deepfakes and stolen Personally Identifiable Information (PII) can be used for more than hoaxes, phishing, and identity theft. Now, these…

Chinese Hackers Attacking Linux Devices With New SSH Backdoor
05
Feb
2025

Chinese Hackers Attacking Linux Devices With New SSH Backdoor

A sophisticated cyber espionage campaign attributed to the Chinese hacking group DaggerFly has been identified, targeting Linux systems through an…

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access
05
Feb
2025

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access

The eSentire Threat Response Unit (TRU) revealed that threat actors are actively exploiting a six-year-old IIS vulnerability in Progress Telerik…

What’s the biggest cyber threat to your company: hackers, employees, or ransomware? | Cybernews
05
Feb
2025

What’s the biggest cyber threat to your company: hackers, employees, or ransomware? | Cybernews

Given the tremendous growth in cyberattacks during the COVID pandemic, it may be tempting to assume that external threats must…

CISA Releases Nine Security Advisories on ICS Vulnerabilities and Exploits
05
Feb
2025

CISA Releases Nine Security Advisories on ICS Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released nine advisories targeting security vulnerabilities in Industrial Control Systems (ICS). These…