Author: Cybernoz

Hackers Exploit Adobe ColdFusion Flaw to Hack Government Servers
06
Dec
2023

Hackers Exploit Adobe ColdFusion Flaw to Hack Government Servers

A recent cybersecurity advisory from CISA has brought to light a formidable cyber onslaught, revealing an alarming breach where faceless…

Cyber Threat emerges out of Apple iOS 17 new NameDrop Feature
06
Dec
2023

Cyber Threat emerges out of Apple iOS 17 new NameDrop Feature

Apple’s recent update to iOS 17 introduced a new feature called NameDrop, enhancing data transfer capabilities for iPhone and Apple…

06
Dec
2023

CISA: Adobe ColdFusion flaw leveraged to access government servers (CVE-2023-26360)

Unknown attackers have leveraged a critical vulnerability (CVE-2023-26360) in the Adobe ColdFusion application development platform to access government servers, the…

Cyber and Physical Security Are Different, But They Must Work Together
06
Dec
2023

Cyber and Physical Security Are Different, But They Must Work Together

[By Blake Benson, Senior Director – Industrial Cybersecurity Practice at ABS Group] America’s critical infrastructure faces more diverse threats than…

06
Dec
2023

Atlassian fixes four critical RCE vulnerabilities, patch quickly!

Atlassian has released security updates for four critical vulnerabilities (CVE-2023-1471, CVE-2023-22522, CVE-2023-22524, CVE-2023-22523) in its various offerings that could be…

Windows 10 logo
06
Dec
2023

Windows 10 gets its own extended security updates program

The day that Windows 10 machines will get their last security updates is set for October 14, 2025. So if…

06
Dec
2023

Living Security Unify Go improves human risk management

Living Security announced Unify Go, a free tool for Living Security training customers that surfaces security vulnerabilities across the workforce…

coldfusion vulnerability
06
Dec
2023

Adobe Coldfusion vulnerability used in attacks on government servers

The Cybersecurity and Infrastructure Security Agency (CISA) put out a Cybersecurity Advisory (CSA) to alert government agencies about cybercriminals using…

Cloud Accounts
06
Dec
2023

Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts

Dec 06, 2023NewsroomAccess Management / Cloud Security Threat actors can take advantage of Amazon Web Services Security Token Service (AWS…

Nissan is investigating cyberattack and potential data breach
06
Dec
2023

Nissan is investigating cyberattack and potential data breach

Japanese car maker Nissan is investigating a cyberattack that targeted its systems in Australia and New Zealand, which may have…

Hackers Exploiting Crypto Liquidity Pools to Execute Trades
06
Dec
2023

Hackers Exploiting Crypto Liquidity Pools to Execute Trades

Crypto pool liquidity is the total assets locked in a decentralized finance (DeFi) liquidity pool. Hackers manipulate the pool liquidity…

Kali Linux 2023.4
06
Dec
2023

Hackers Employ AI to Launch Highly sophistication Attacks

It has been observed that threat actors are using AI technology to conduct illicit operations on social media platforms. These…