Author: Cybernoz

IT Sustainability Think Tank: The economic benefits of going green
16
Dec
2024

IT Sustainability Think Tank: The economic benefits of going green

We have witnessed an undeniable backlash against sustainability this year. Despite the news cycle being awash with coverage of the…

Telecom Namibia Cyberattack: 400,000 Files Leaked
16
Dec
2024

Telecom Namibia Cyberattack: 400,000 Files Leaked

Telecom Namibia has fallen victim to a cyberattack, resulting in the leak of over 400,000 customer files. The Telecom Namibia…

Multiple flaws in Volkswagen Group's infotainment unit allow for vehicle compromise
16
Dec
2024

Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise

Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise Pierluigi Paganini December 16, 2024 Researchers discovered multiple flaws…

Multiple flaws in Volkswagen Group's infotainment unit allow for vehicle compromise
16
Dec
2024

Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise

Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise Pierluigi Paganini December 16, 2024 Researchers discovered multiple flaws…

Rhode Island Cyberattack Exposes Personal Data Of Thousands
16
Dec
2024

Rhode Island Cyberattack Exposes Personal Data Of Thousands

Rhode Island is tackling with a major cybersecurity breach that has compromised the personal information of thousands of residents. The…

Tic TAC Alert: A Remote Code Execution Vulnerability in Medical Imaging
16
Dec
2024

A Remote Code Execution Vulnerability in Medical Imaging

A critical Remote Code Execution (RCE) vulnerability has been discovered in a popular open-source biomedical tool used worldwide. This vulnerability,…

week in security
16
Dec
2024

A week in security (December 9 – December 15)

December 13, 2024 – Care1, a Canadian healthcare solutions provider left a cloud storage instance freely accessible and unencrypted for…

Cyble Sensor Intelligence Report Surge In Vulnerabilities
16
Dec
2024

Cyble Sensor Intelligence Report Surge In Vulnerabilities

The latest Sensor Intelligence Report from Cyble, dated December 4–10, 2024, sheds light on a troubling increase in cyber threats,…

Naveen Goud
16
Dec
2024

Cybersecurity News Headlines Trending on Google

Surge in Passkey Security Adoption in 2024 Tech giants such as Google, Amazon, Microsoft, and Facebook are leading the charge…

Cyber Ops and Reconnaissance
16
Dec
2024

Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes

Dec 16, 2024Ravie LakshmananCyber Attack / Cyber Espionage The Security Service of Ukraine (SBU or SSU) has exposed a novel…

Authorities Use Novispy Spyware & Cellebrite Forensic Tools to Hack Journalists
16
Dec
2024

Authorities Use Novispy Spyware & Cellebrite Forensic Tools to Hack Journalists

 Serbian police and intelligence services have been reported to use advanced phone spyware in conjunction with mobile forensic tools to…

Naveen Goud
16
Dec
2024

How Man-in-the-Middle Attacks Can Be Thwarted

Man-in-the-middle (MITM) attacks are a significant cybersecurity threat, where an attacker intercepts and potentially alters communication between two parties without…