Author: Cybernoz

DeepSeek's popularity exploited by malware peddlers, scammers
29
Jan
2025

DeepSeek’s popularity exploited by malware peddlers, scammers

As US-based AI companies struggle with the news that the recently released Chinese-made open source DeepSeek-R1 reasoning model performs as…

SLAP & FLOP Attacks
29
Jan
2025

New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits

A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new side-channel attacks…

Hackers Attacking Windows, macOS, and Linux systems With SparkRAT
29
Jan
2025

Hackers Attacking Windows, macOS, and Linux systems With SparkRAT

Researchers have uncovered new developments in SparkRAT operations, shedding light on its persistent use in malicious campaigns targeting macOS users…

AI in Cybersecurity
29
Jan
2025

What’s Effective and What’s Not – Insights from 200 Experts

Jan 29, 2025The Hacker NewsThreat Detection / Artificial Intelligence Curious about the buzz around AI in cybersecurity? Wonder if it’s…

Hackerone logo
29
Jan
2025

Proposed Legislation Requires Federal Contractors Implement VDPs

Federal contractors play a critical role in supporting the U.S. government. Because of their access to federal systems and data,…

The Trial at the Tip of the Terrorgram Iceberg
29
Jan
2025

The Trial at the Tip of the Terrorgram Iceberg

Brandon Russell, arguably one of the most influential figures in the American neofascist revival of the past decade, is on…

New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability
29
Jan
2025

New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability

Akamai’s Security Intelligence and Response Team (SIRT) has uncovered a novel variant of the Mirai-based botnet malware, dubbed Aquabotv3, actively…

Cacti Security Flaw
29
Jan
2025

Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution

Jan 29, 2025Ravie LakshmananVulnerability / Threat Intelligence A critical security flaw has been disclosed in the Cacti open-source network monitoring…

Windows CLFS Buffer Overflow Vulnerability CVE-2024-49138
29
Jan
2025

Windows CLFS Buffer Overflow Vulnerability CVE-2024-49138

 A recently disclosed Windows kernel-level vulnerability, identified as CVE-2024-49138, has raised significant security concerns in the cybersecurity community. Leveraging a buffer…

Print Friendly, PDF & Email
29
Jan
2025

The Importance of Data Privacy in an Ever Evolving Digital Landscape –

Data Protection Day, celebrated annually on January 28th, highlights the importance of safeguarding personal information in a digital world. Originally…

Jane Devry
29
Jan
2025

Taking a Threat Adapted Approach to Vulnerability Management

As cyber threats continue to grow in complexity and frequency, vulnerability management requires more than just patching systems; it demands…

How Interlock Ransomware Infects Healthcare Organizations
29
Jan
2025

How Interlock Ransomware Infects Healthcare Organizations

Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth…