Author: Cybernoz

Bertrand Russell’s Essay: What I Believe
18
Apr
2025

Bertrand Russell’s Essay: What I Believe

“The good life is one inspired by love and guided by knowledge.” ~ Bertrand Russell Jun 12, 2011 I just…

Lemonade says applicant driver’s license numbers exposed
18
Apr
2025

Lemonade says applicant driver’s license numbers exposed

Lemonade Inc. has begun sending notification letters to about 190,000 people after their driver’s license numbers were transmitted unencrypted, according…

Fortinet Ends SSL-VPN Support From 7.6.3 Onwards! 
18
Apr
2025

Fortinet Ends SSL-VPN Support From 7.6.3 Onwards! 

Fortinet has announced the complete removal of SSL VPN tunnel mode functionality in the upcoming FortiOS 7.6.3 release.  This change,…

ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform
18
Apr
2025

ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform

“No other vendor could meet these timeframes of having the infrastructure in place to meet this urgent requirement and deliver…

U.S DOGE Allegedly Breached - Whistleblower Leaked Most Sensitive Documents
18
Apr
2025

U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents

A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a major cybersecurity breach at the National…

Chinese Smishing Kit
18
Apr
2025

Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States

Cybersecurity researchers are warning of a “widespread and ongoing” SMS phishing campaign that’s been targeting toll road users in the…

Hashing vs. Encryption vs. Encoding vs. Obfuscation
18
Apr
2025

Hashing vs. Encryption vs. Encoding vs. Obfuscation

There is often significant confusion around the differences between encryption, encoding, hashing, and obfuscation. Get the TL;DR Let’s take a…

SonicWall
18
Apr
2025

SonicWall SMA VPN devices targeted in attacks since January

A remote code execution vulnerability affecting SonicWall Secure Mobile Access (SMA) appliances has been under active exploitation since at least…

Securing the Digital Transformation Journey
18
Apr
2025

Securing the Digital Transformation Journey

Digital transformation is no longer a buzzword it is a strategic imperative for organizations seeking to stay competitive in an…

How to Conduct a Cloud Security Assessment
18
Apr
2025

How to Conduct a Cloud Security Assessment

Cloud adoption has transformed organizations’ operations but introduces complex security challenges that demand proactive leadership and a thorough Cloud Security…

How to Build a Just Society
18
Apr
2025

How to Build a Just Society

I was re-reading a part of Moral Landscape this weekend and came across a concept I had not shared yet….

RAT malware
18
Apr
2025

Chinese hackers target Russian govt with upgraded RAT malware

Chinese-speaking IronHusky hackers are targeting Russian and Mongolian government organizations using upgraded MysterySnail remote access trojan (RAT) malware. Security researchers…