Author: Cybernoz

How to secure Notes on iOS and macOS
21
Feb
2025

How to secure Notes on iOS and macOS

Apple allows you to lock your notes using your iPhone passcode or a separate password, ensuring your private information stays…

Ivanti Endpoint Manager Vulnerabilities Proof-of-Concept (PoC) Exploit Released
21
Feb
2025

Ivanti Endpoint Manager Vulnerabilities Proof-of-Concept (PoC) Exploit Released

A cluster of four critical vulnerabilities in Ivanti Endpoint Manager (EPM) has entered a dangerous new phase with the public…

Windows Wi-Fi Password Stealer Malware Found Hosted on GitHub
21
Feb
2025

Windows Wi-Fi Password Stealer Malware Found Hosted on GitHub

A GitHub repository titled Windows-WiFi-Password-Stealer has surfaced, raising concerns among cybersecurity professionals.  This repository, hosted by the user, provides a…

New infosec products of the week: February 21, 2025
21
Feb
2025

New infosec products of the week: February 21, 2025

Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Fortinet, Pangea, Privacera, and…

Google Released PoC Exploit for Palo Alto Firewall Command Injection Vulnerability
21
Feb
2025

Google Released PoC Exploit for Palo Alto Firewall Command Injection Vulnerability

Google’s Project Zero and Mandiant cybersecurity teams have jointly published a proof-of-concept (PoC) exploit for a high-severity command injection vulnerability…

New Active Directory Pentesting Tool For KeyCredentialLink Management
21
Feb
2025

New Active Directory Pentesting Tool For KeyCredentialLink Management

RedTeamPentesting has unveiled a new tool, keycred, which offers a robust solution for managing KeyCredentialLinks in Active Directory (AD) environments….

Salt Typhoon used custom malware JumbledPath to spy on U.S. telecom providers
21
Feb
2025

Salt Typhoon used custom malware JumbledPath to spy on U.S. telecom providers

Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers Pierluigi Paganini February 20, 2025 China-linked cyber espionage group…

How to Sue a Company Under GDPR for Data Misuse and Privacy Violations
21
Feb
2025

How to Sue a Company Under GDPR for Data Misuse and Privacy Violations

Learn how to sue companies under GDPR for data misuse. Understand your rights, file complaints, and claim compensation for privacy…

Hackers Drop NetSupport RAT & StealC Malware on Your Windows Via Fake Browser Updates
21
Feb
2025

Hackers Drop NetSupport RAT & StealC Malware on Your Windows Via Fake Browser Updates

Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by the threat actor group SmartApeSG, also known as ZPHP or…

Data leak
21
Feb
2025

Black Basta ransomware gang’s internal chat logs leak online

An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the…

Phishing attack Exploit CEOs, CTOs, and Top Decision-Makers
21
Feb
2025

Phishing attack Exploit CEOs, CTOs, and Top Decision-Makers

A recent phishing campaign conducted by cybersecurity firm Hackmosphere has revealed alarming vulnerabilities among top decision-makers, including CEOs and CTOs….

Scanner
21
Feb
2025

Apiiro unveils free scanner to detect malicious code merges

Security researchers at Apiiro have released two free, open-source tools designed to detect and block malicious code before they are…