Author: Cybernoz

OWASP NHI Top 10
27
Jan
2025

Do We Really Need The OWASP NHI Top 10?

The Open Web Application Security Project has recently introduced a new Top 10 project – the Non-Human Identity (NHI) Top…

Chrome Security Update - Patch for 3 High-Severity Vulnerabilities
27
Jan
2025

Chrome Security Update – Patch for 3 High-Severity Vulnerabilities

Google has released a critical update for the Chrome browser, addressing three high-severity security vulnerabilities. This patch, part of the…

SonicWall SMA Appliances Exploited in Zero-Day Attacks
27
Jan
2025

SonicWall SMA Appliances Exploited in Zero-Day Attacks

Critical security flaw in SonicWall SMA 1000 appliances (CVE-2025-23006) exploited as a zero-day. Rated CVSS 9.8, patch immediately to protect…

ESXi ransomware attacks use SSH tunnels to avoid detection
27
Jan
2025

ESXi ransomware attacks use SSH tunnels to avoid detection

ESXi ransomware attacks use SSH tunnels to avoid detection Pierluigi Paganini January 27, 2025 Threat actors behind ESXi ransomware attacks…

27
Jan
2025

Hack My Career: Harley Kimball’s Journey to DEFCON

In this interview, we explore Harley’s experience at DEFCON, the world’s largest hacker convention, where he took his skills to…

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials
27
Jan
2025

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare’s workers.dev, a free domain name service, to execute credential theft campaigns….

Public cloud: Data sovereignty and data security in the UK
27
Jan
2025

Public cloud: Data sovereignty and data security in the UK

The UK government’s decision to designate datacentres as critical national infrastructure (CNI) in September 2024 signalled its ambition to build…

Hackers allegedly stole $69M from cryptocurrency platform Phemex
27
Jan
2025

Hackers allegedly stole $69M from cryptocurrency platform Phemex

Attackers allegedly stole $69 million from cryptocurrency platform Phemex Pierluigi Paganini January 27, 2025 Crooks stole at least $69 million…

Hackerone logo
27
Jan
2025

Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

Take Precision to the Next Level—Beyond Basic AI Efficiency and precision are critical in every operation. However, many security teams…

Cyber Espionage
27
Jan
2025

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

Jan 27, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A previously unknown threat actor has been observed copying the tradecraft associated…

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel
27
Jan
2025

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel

 A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in…

week in security
27
Jan
2025

A week in security (January 20 – January 26)

Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! Our business solutions remove all remnants of ransomware and…