Author: Cybernoz

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File
31
Dec
2024

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user visits the infected site, their system…

Veritas Vulnerability Let Attackers Execute Arbitrary SQL Commands
31
Dec
2024

Veritas Vulnerability Let Attackers Execute Arbitrary SQL Commands

A newly discovered vulnerability in Veritas/Arctera Data Insight software (versions 7.1 and prior) highlights a significant security concern, allowing attackers…

US Treasury Department Breach, Hackers Accessed Workstations
31
Dec
2024

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department, gaining unauthorized access to employee…

Hospital
31
Dec
2024

Massive healthcare breaches prompt US cybersecurity rules overhaul

The U.S. Department of Health and Human Services (HHS) has proposed updates to the Health Insurance Portability and Accountability Act…

Cloudflare Launches New Tool h3i for HTTP/3 Testing & Debugging
31
Dec
2024

Cloudflare Launches New Tool h3i for HTTP/3 Testing & Debugging

Cloudflare, a leader in Internet performance and security, has unveiled a powerful new open-source tool named h3i, designed to enhance testing…

New Botnet Exploiting D-Link Routers To Gain Control Remotely
31
Dec
2024

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the “FICORA” and “CAPSAICIN,” both variants of Mirai and Kaiten, respectively, which…

China-linked actors hacked US Treasury Department
31
Dec
2024

China-linked actors hacked US Treasury Department

China-linked actors hacked US Treasury Department Pierluigi Paganini December 31, 2024 China-linked threat actors breached the U.S. Treasury Department by…

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code
31
Dec
2024

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a critical vulnerability in TrueNAS CORE,…

U.S. Treasury Systems
31
Dec
2024

Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents

Dec 31, 2025Ravie LakshmananVulnerability / Incident Response The United States Treasury Department said it suffered a “major cybersecurity incident” that…

Naveen Goud
31
Dec
2024

Cybersecurity Trends of 2024: Adapting to a Changing Threat Landscape

As we move into 2024, the cybersecurity landscape continues to evolve rapidly in response to emerging technologies, increasing cyber threats,…

Naveen Goud
31
Dec
2024

Chinese APT Hackers behind US Treasury breach of data

Chinese hackers, reportedly part of an Advanced Persistent Threat (APT) group, are accused of breaching the servers and workstations of…

Regulations, security, and remote work: Why network outsourcing is booming
31
Dec
2024

Regulations, security, and remote work: Why network outsourcing is booming

A growing number of enterprises in the US are adopting managed network services to support AI and other new technologies…