Author: Cybernoz

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
05
Feb
2025

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

Feb 05, 2025Ravie LakshmananVulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security…

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database
05
Feb
2025

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified…

Dutch university recovered ransomware payment with a $300k profit | Cybernews
05
Feb
2025

Dutch university recovered ransomware payment with a $300k profit | Cybernews

Even though the authorities recovered only a fraction of the payment made in Bitcoin three years ago, the victim made…

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code
05
Feb
2025

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code

A critical vulnerability, CVE-2025-23114, has been discovered within the Veeam Updater component that poses a serious risk to organizations utilizing…

Is voice recognition another biometric surveillance tool? | Cybernews
05
Feb
2025

Is voice recognition another biometric surveillance tool? | Cybernews

Considering the alarm bells around biometric surveillance tech, should we be concerned about the popularity of voice technology? In 2002,…

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
05
Feb
2025

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers,…

OpenNHP: Cryptography-driven zero trust protocol
05
Feb
2025

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data….

North Korea backing healthcare ransom attacks in US
05
Feb
2025

North Korea backing healthcare ransom attacks in US

Cybercriminal groups linked to the rogue state have been using Maui ransomware to attack healthcare and public health organizations in…

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code
05
Feb
2025

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code

The Google Chrome team has officially released Chrome 133, now available on the stable channel for Windows, Mac, and Linux….

Microsoft records a phishing campaign targeting over 10k organizations | Cybernews
05
Feb
2025

Microsoft records a phishing campaign targeting over 10k organizations | Cybernews

Threat actors behind a large-scale phishing campaign stole passwords, hijacked a user’s sign-in session, and were able to circumvent the…

More destructive cyberattacks target financial institutions
05
Feb
2025

More destructive cyberattacks target financial institutions

Financial institutions will continue to be the ultimate targets for criminals and threat actors, as a successful attack offers a…

Power of deepfakes: three times the world fell for dangerous fakes | Cybernews
05
Feb
2025

Power of deepfakes: three times the world fell for dangerous fakes | Cybernews

Deepfakes are more than silly games and pranks. At least on five accounts, they almost had the power to change…