Author: Cybernoz

Scammers Are Creating Fake News Videos to Blackmail Victims
27
Jan
2025

Scammers Are Creating Fake News Videos to Blackmail Victims

Typically, Yahoo Boy scammers message hundreds of people online while posing as members of the opposite sex using pictures stolen…

Burp Suite 2025.1 Released, What’s New!
27
Jan
2025

Burp Suite 2025.1 Released, What’s New!

Burp Suite 2025.1, is packed with new features and enhancements designed to improve your web application testing workflow. This latest…

OWASP NHI Top 10
27
Jan
2025

Do We Really Need The OWASP NHI Top 10?

The Open Web Application Security Project has recently introduced a new Top 10 project – the Non-Human Identity (NHI) Top…

Chrome Security Update - Patch for 3 High-Severity Vulnerabilities
27
Jan
2025

Chrome Security Update – Patch for 3 High-Severity Vulnerabilities

Google has released a critical update for the Chrome browser, addressing three high-severity security vulnerabilities. This patch, part of the…

SonicWall SMA Appliances Exploited in Zero-Day Attacks
27
Jan
2025

SonicWall SMA Appliances Exploited in Zero-Day Attacks

Critical security flaw in SonicWall SMA 1000 appliances (CVE-2025-23006) exploited as a zero-day. Rated CVSS 9.8, patch immediately to protect…

ESXi ransomware attacks use SSH tunnels to avoid detection
27
Jan
2025

ESXi ransomware attacks use SSH tunnels to avoid detection

ESXi ransomware attacks use SSH tunnels to avoid detection Pierluigi Paganini January 27, 2025 Threat actors behind ESXi ransomware attacks…

27
Jan
2025

Hack My Career: Harley Kimball’s Journey to DEFCON

In this interview, we explore Harley’s experience at DEFCON, the world’s largest hacker convention, where he took his skills to…

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials
27
Jan
2025

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare’s workers.dev, a free domain name service, to execute credential theft campaigns….

Public cloud: Data sovereignty and data security in the UK
27
Jan
2025

Public cloud: Data sovereignty and data security in the UK

The UK government’s decision to designate datacentres as critical national infrastructure (CNI) in September 2024 signalled its ambition to build…

Hackers allegedly stole $69M from cryptocurrency platform Phemex
27
Jan
2025

Hackers allegedly stole $69M from cryptocurrency platform Phemex

Attackers allegedly stole $69 million from cryptocurrency platform Phemex Pierluigi Paganini January 27, 2025 Crooks stole at least $69 million…

Hackerone logo
27
Jan
2025

Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

Take Precision to the Next Level—Beyond Basic AI Efficiency and precision are critical in every operation. However, many security teams…

Cyber Espionage
27
Jan
2025

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

Jan 27, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A previously unknown threat actor has been observed copying the tradecraft associated…