Author: Cybernoz

HellCat hackers focus on breaching Jira servers worldwide
20
Mar
2025

HellCat hackers go on a worldwide Jira hacking spree

Swiss global solutions provider Ascom has confirmed a cyberattack on its IT infrastructure as a hacker group known as Hellcat…

Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerability 
20
Mar
2025

Hackers Exploiting Multiple Cisco Smart Licensing Utility Vulnerability 

Researchers have detected active exploitation attempts targeting two critical vulnerabilities in Cisco’s Smart Licensing Utility that were patched approximately six…

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics
20
Mar
2025

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged as a significant player in…

Veeam and IBM
20
Mar
2025

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems

Mar 20, 2025Ravie LakshmananVulnerability / Software Update Veeam has released security updates to address a critical security flaw impacting its…

Hyperscale datacentre capacities continue to rise off back of AI boom
20
Mar
2025

Hyperscale datacentre capacities continue to rise off back of AI boom

Hyperscale datacentres are increasing in capacity faster than number as operators push to meet the growing demand for compute capacity…

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog
20
Mar
2025

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog Pierluigi…

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers
20
Mar
2025

New Steganographic Malware Exploits JPEG Files to Distribute Infostealers

A sophisticated malware campaign employing steganographic techniques has recently been identified, targeting users through seemingly innocent JPEG image files. The…

AI-Powered Cyber Attacks and Data Privacy in The Age of Big Data
20
Mar
2025

AI-Powered Cyber Attacks and Data Privacy in The Age of Big Data

The fast transformation and evolution of artificial intelligence (AI) significantly changed the general norm and operational process of industries. This…

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%
20
Mar
2025

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp…

More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools
20
Mar
2025

More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools

20 Mar More Than Half Of Ransomware Attacks Bypass Traditional Detection Tools Posted at 09:11h in Blogs by Taylor Fox…

Government considering redress scheme for families of Post Office scandal victims
20
Mar
2025

Government considering redress scheme for families of Post Office scandal victims

The government is considering a separate scheme to provide redress to the families of subpostmasters affected by the Post Office…

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches
20
Mar
2025

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is…