Author: Cybernoz

Hackers Exploiting Apache Struts2 Vulnerability to upload Malicious Payloads
16
Dec
2024

Hackers Exploiting Apache Struts2 Vulnerability to upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used open-source framework for developing Java web…

Malware Hidden in Fake Business Proposals Hits YouTube Creators
16
Dec
2024

Malware Hidden in Fake Business Proposals Hits YouTube Creators

summary Phishing Attack: Cybercriminals use fake brand collaboration emails to target YouTube creators. Malware Disguise: Malicious files are hidden in…

Oxford university’s IT department pilots Microsoft Copilot
16
Dec
2024

Oxford university’s IT department pilots Microsoft Copilot

As part of a pilot roll-out, the IT service department at the University of Oxford has run a week-long survey…

The Top Cybersecurity Agency in the US Is Bracing for Donald Trump
16
Dec
2024

The Top Cybersecurity Agency in the US Is Bracing for Donald Trump

A second CISA employee predicts that “compliance efforts like secure-by-design may not have the support that they currently benefit from.”…

Hackers Weaponizing Microsoft Teams to Gain Remote Access
16
Dec
2024

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams to gain remote access to victim…

Data Governance in DevOps
16
Dec
2024

Ensuring Compliance in the AI Era

With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility…

Microsoft Teams to Gain Remote Access
16
Dec
2024

Hackers Using Microsoft Teams to Gain Remote Access to User’s System

Hackers leveraged Microsoft Teams to manipulate a victim into granting remote access to their system. The attack, analyzed by Trend…

Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets
16
Dec
2024

Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets

Digital license plates, already legal to buy in a growing number of states and to drive with nationwide, offer a…

Glutton PHP Malware
16
Dec
2024

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting…

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms 
16
Dec
2024

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms 

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms  Pierluigi Paganini December 15, 2024 Researchers discovered PUMAKIT, a Linux rootkit…

Hackers Attacking YouTube Creators with Weponized Collaboration Requests
16
Dec
2024

Hackers Attacking YouTube Creators with Weponized Collaboration Requests

A new wave of cyberattacks has emerged, targeting YouTube creators through malicious collaboration requests that exploit the trust between creators…

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide
16
Dec
2024

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

Dec 16, 2024Ravie LakshmananCryptocurrency / Phishing Attack Cybersecurity researchers are calling attention to a new kind of investment scam that…