Author: Cybernoz

Opinion: Saudi plans to be an IT superpower, but challenges lie ahead
17
Feb
2025

Opinion: Saudi plans to be an IT superpower, but challenges lie ahead

Saudi Arabia is spending big on IT, and on artificial intelligence (AI) in particular, in an effort to diversify from…

whoAMI attack could allow remote code execution within AWS account
17
Feb
2025

whoAMI attack could allow remote code execution within AWS account

whoAMI attack could allow remote code execution within AWS account Pierluigi Paganini February 17, 2025 Researchers warn that the whoAMI…

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication
17
Feb
2025

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication

Security researchers at Volexity have uncovered multiple Russian threat actors conducting sophisticated social engineering and spear-phishing campaigns targeting Microsoft 365…

RAG AI: ‘Do it yourself,’ says NYC data scientist
17
Feb
2025

RAG AI: ‘Do it yourself,’ says NYC data scientist

Organisations should build their own generative artificial intelligence-based (GenAI-based) on retrieval augmented generation (RAG) with open sources products such as…

Android 16 Blocks Scammers With In-Call Security Features
17
Feb
2025

Android 16 Blocks Scammers With In-Call Security Features

Google is working to enhance the security of its mobile operating system, focusing on preventing scammers from exploiting certain phone…

Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number
17
Feb
2025

Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number

The Indian Post Office portal was found vulnerable to an Insecure Direct Object Reference (IDOR) attack, exposing sensitive Know Your…

A path to better data engineering
17
Feb
2025

A path to better data engineering

Today’s data landscape presents unprecedented challenges for organisations, due to the need for businesses to process thousands of documents in…

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
17
Feb
2025

Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment

A sophisticated cyber threat has emerged in recent weeks, targeting unsuspecting users with fake Outlook troubleshooting calls. These calls, designed…

week in security
17
Feb
2025

A week in security (February 10 – February 16)

February 14, 2025 – A cybercriminal stole a reported 12 million data records on Zacks’ customers and clients. February 13,…

A Free Cybersecurity Lab for Security Teams To Analyse Cyber Threats
17
Feb
2025

A Free Cybersecurity Lab for Security Teams To Analyse Cyber Threats

In a significant step forward for cybersecurity professionals, PurpleLab offers an innovative open-source cybersecurity lab for creating and testing detection…

Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry
17
Feb
2025

Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry

Threat actors have been utilizing a modified version of the SharpHide tool to create hidden registry values, significantly complicating detection…

Naveen Goud
17
Feb
2025

Samsung brings in Quantum safe security to its Knox Security Ecosystem

Samsung has consistently been at the forefront of technological innovation, and its latest advancement comes in the form of enhanced…