Author: Cybernoz

Decrypter Released for the Notorious Akira Ransomware
30
Jun
2023

Decrypter Released for the Notorious Akira Ransomware

Akira ransomware appeared in 2017 when it encrypted video folders without leaving any ransom notes. The file encrypted by Akira…

World Password Day 2023: Why we need a password-less future
30
Jun
2023

World Password Day 2023: Why we need a password-less future

[ This article was originally published here ] If you’ve read part one, you’ll know that there’s a persistent problem…

CISA
30
Jun
2023

CISA issues DDoS warning after attacks hit multiple US orgs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of ongoing distributed denial-of-service (DDoS) attacks after U.S. organizations across…

New RUSTBUCKET Malware
30
Jun
2023

New RUSTBUCKET Malware With Zero Detections on VirusTotal

The DPRK campaign is utilizing a recently updated version of Rustbucket malware to avoid being detected. This variant of RUSTBUCKET,…

Heavy-Hitting 8Base Ransomware Attacking Industries
30
Jun
2023

Heavy-Hitting 8Base Ransomware Attacking Industries

The sudden surge in the activity of 8base ransomware in June 2023 shows it is a well-established organization to execute…

10 Tips for Better Data Security During Cloud Migration
30
Jun
2023

10 Tips for Better Data Security During Cloud Migration

Migrating data to the cloud comes with many unique security considerations. The process itself can result in data loss or…

Researchers Use Power LED to Extract Encryption Keys in Groundbreaking Attack
30
Jun
2023

Researchers Use Power LED to Extract Encryption Keys in Groundbreaking Attack

The cybersecurity researchers from the Ben-Gurion University of the Negev and Cornell University have revealed how a side-channel attack targeting…

Why are passwords still a problem in 2023?
30
Jun
2023

Why are passwords still a problem in 2023?

[ This article was originally published here ] World Password Day has come around again. Since its inception, it’s an…

Tech jobs are on the rise, but soft skills are most coveted, says WEF
30
Jun
2023

AI can never be given control over combat decisions, Lords told

Introducing autonomy into weapon systems will increase the unpredictability of armed conflict due to the technical inability of artificial intelligence…

Patch Diffing Progress MOVEIt Transfer RCE (CVE-2023-34362) – Assetnote
30
Jun
2023

Citrix Gateway Open Redirect and XSS (CVE-2023-24488) – Assetnote

Summary URL query parameters are not adequately sanitised before they are placed into an HTTP Location header. An attacker can…

Why Should You Take IT Security Seriously?
30
Jun
2023

Crack the Code: How to Secure Your Dream Cybersecurity Career

With cyber threats constantly dominating headlines, the draw of a career in cybersecurity has never been higher for young professionals. …

GuLoader Attacking Law Firms Using Weaponized PDF File
30
Jun
2023

GuLoader Attacking Law Firms Using Weaponized PDF File

The cybersecurity researchers at Morphisec Labs have been tracking the GuLoader campaign since April of this year and found that…