Author: Cybernoz

DoubleClickjacking
01
Jan
2025

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

Jan 01, 2025Ravie LakshmananWeb Security / Vulnerability Threat hunters have disclosed a new “widespread timing-based vulnerability class” that leverages a…

U.S. Treasury sanctions Russian and Iranian entities for interfering in the presidential election
01
Jan
2025

U.S. Treasury sanctions Russian and Iranian entities for interfering in the presidential election

U.S. Treasury sanctions Russian and Iranian entities for interfering in the presidential election Pierluigi Paganini January 01, 2025 The U.S….

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military
01
Jan
2025

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake “Army+” application websites, which host a malicious installer…

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely
01
Jan
2025

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a critical command injection vulnerability.  Exploitable…

How To Navigate Certification Authority Distrust: Preventing Critical Incidents by Switching To A New Vendor
01
Jan
2025

How To Navigate Certification Authority Distrust: Preventing Critical Incidents by Switching To A New Vendor

In the ever-evolving landscape of digital security, maintaining trust is paramount. When a Certification Authority (CA) is no longer trusted…

Election Interference Using AI and Cyber Tactics
01
Jan
2025

Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics

Jan 01, 2025Ravie LakshmananGenerative AI / Election Interference The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Tuesday…

Hey, Maybe It's Time to Delete Some Old Chat Histories
01
Jan
2025

Hey, Maybe It’s Time to Delete Some Old Chat Histories

If you’re worried about possible expansions of government surveillance and access to your information, or simply want to do some…

FortiGuard Labs Links EC2 Grouper Hackers to AWS Credential Exploits
01
Jan
2025

FortiGuard Labs Links New EC2 Grouper Hackers to AWS Credential Exploits

SUMMARY EC2 Grouper Identified: Researchers found EC2 Grouper exploiting AWS credentials and tools using distinct patterns like “ec2group12345.” Credential Compromise:…

DoubleClickjacking
01
Jan
2025

“Double-Click” Attack to Hack Websites & Take over Accounts

In a concerning development for internet security, a new variation of a long-standing cyberattack technique known as “DoubleClickjacking,” has been…

Naveen Goud
01
Jan
2025

Cybersecurity news headlines trending on Happy New Year 2025

Harley-Davidson Faces Data Breach, Customer Information Leaked Harley Davidson, the iconic American motorcycle manufacturer, has become the latest victim of…

Naveen Goud
01
Jan
2025

The Evolution of Ransomware: From the 1970s to 2024

Ransomware has evolved significantly since its inception in the 1970s, growing from simple, isolated incidents to a complex, global threat…

35 Google Chrome Extensions Hacked
01
Jan
2025

35 Google Chrome Extensions Hacked to Inject Malicious Code

A massive phishing campaign has compromised at least 35 Google Chrome extensions, collectively used by approximately 2.6 million users, injecting…