Author: Cybernoz

Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers
15
Jan
2025

Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers

A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in the wild…

Cisco Releases Security Updates Addressing Vulnerabilities in ThousandEyes and Snort
15
Jan
2025

Cisco Releases Security Updates Addressing Vulnerabilities in ThousandEyes and Snort

Cisco has released security vulnerabilities impacting its ThousandEyes Endpoint Agent for macOS and RoomOS, as well as its Snort detection…

Naveen Goud
15
Jan
2025

Fortinet Vulnerability exposes its firewall customers to Cyber Threats

Fortinet, the prominent American cybersecurity company, has recently found itself at the center of a media storm after reports emerged…

CISA Launches AI Cybersecurity Playbook To Combat Cyber Threats
15
Jan
2025

CISA Launches AI Cybersecurity Playbook To Combat Cyber Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new tool aimed at strengthening the cybersecurity resilience of AI…

CISA Released a Free AI Cybersecurity Collaboration Playbook (PDF)
15
Jan
2025

CISA Released a Free AI Cybersecurity Collaboration Playbook (PDF)

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled the AI Cybersecurity Collaboration Playbook, a new guidance document aimed at…

Zoom Security Update - Patches Multiple Vulnerabilities That Let Attackers Escalate Privileges
15
Jan
2025

Zoom Security Update – Patches Multiple Vulnerabilities That Let Attackers Escalate Privileges

Zoom Video Communications has released a critical security update addressing multiple vulnerabilities in its suite of applications, including a high-severity…

Jane Devry
15
Jan
2025

Teleport 17 Enhances Secure Infrastructure Access for Large Enterprises

Infrastructure identity provider Teleport has introduced its latest update, Teleport 17, designed to simplify the management of access controls and…

Windows OLE Remote Code Execution Vulnerability Could Be Exploited Via Email
15
Jan
2025

Windows OLE Remote Code Execution Vulnerability Could Be Exploited Via Email

Microsoft has disclosed a newly identified critical security vulnerability (CVE-2025-21298) affecting Object Linking and Embedding (OLE), a technology widely used…

What Is Public Cloud vs. Private Cloud? Pros and Cons Explained 
15
Jan
2025

What Is Public Cloud vs. Private Cloud? Pros and Cons Explained 

Are you trying to decide between public and private cloud solutions for your business? It’s not always easy to figure…

Naveen Goud
15
Jan
2025

What Are Encrypted Cyber Attacks

In the ever-evolving world of cybersecurity, the term “encrypted cyber attacks” is gaining attention as a significant threat to organizations…

FBI Deletes PlugX Malware
15
Jan
2025

FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation

Jan 15, 2025Ravie LakshmananMalware / Threat Intelligence The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation…

Investing in Bug Bounty: Product & Engineering
15
Jan
2025

Investing in Bug Bounty: Product & Engineering

In an industry where security needs evolve as rapidly as the threats themselves, standing still isn’t an option. At Intigriti,…