Author: Cybernoz

Hackers Attacking Employees With Weaponized Google Drive Links To Deliver Malware
13
Dec
2024

Hackers Weaponize Google Drive Links to Breach Corporate Networks

A sophisticated attack campaign targeting organizations in Japan and other East Asian countries. The threat actor, identified as APT-C-60, is…

300,000+ Prometheus Servers Exposed To DoS Attacks
13
Dec
2024

300,000+ Prometheus Monitoring Servers Exposed To DoS Attacks

Over 336,000 Prometheus servers and Exporters were exposed to DoS attacks, allowing attackers to obtain sensitive information such as credentials…

As the Mastermind of Far-Right ‘Active Clubs’ Goes to Prison, His Violent Movement Goes Global
13
Dec
2024

As the Mastermind of Far-Right ‘Active Clubs’ Goes to Prison, His Violent Movement Goes Global

American neo-Nazi Robert Rundo’s six-year “battle with the feds”—a fight that spans two dismissals, three appellate reversals, and an extradition…

Jane Devry
13
Dec
2024

2025 Outlook: Turning Threats into Opportunities in a New Era of Innovation

As we step into 2025, the cybersecurity landscape is at a pivotal juncture. The challenges of AI-driven threats, evolving data…

New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods
13
Dec
2024

New Stealthy Linux Malware PUMAKIT With Unique Privilege Escalation Methods

Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and…

Jane Devry
13
Dec
2024

Black Hat Europe Recap: Auguria Debuts Newly Enhanced Platform

This year’s Black Hat Europe showcased the latest advancements in research, developments and emerging trends in cybersecurity. Being surrounded by…

Linux Rootkit PUMAKIT
13
Dec
2024

New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection

Dec 13, 2024Ravie LakshmananLinux / Threat Analysis Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with…

Critical Dell Security Vulnerabilities Let Attackers Compromise Affected Systems
13
Dec
2024

Critical Dell Security Vulnerabilities Let Attackers Compromise Affected Systems

Dell has recently disclosed two critical security vulnerabilities affecting a wide range of its products, potentially exposing numerous systems to…

Jane Devry
13
Dec
2024

The three top cybersecurity predictions for 2025

The cyberthreat landscape has shifted rapidly over the past several years, and this evolution will continue in 2025. AI has…

The key to ensuring software quality and reliability
13
Dec
2024

The key to ensuring software quality and reliability

Regression testing is a crucial part of software development that ensures new code changes don’t negatively affect existing functionality. It…

Jane Devry
13
Dec
2024

How the Cyber Grinch Stole Christmas: Safeguard Your Festive Season

The holiday season is a time for celebration, with organisations hosting festive parties and employees spending time with family. However,…

Experts discovered the first mobile malware families linked to Russia's Gamaredon
13
Dec
2024

Experts discovered the first mobile malware families linked to Russia’s Gamaredon

Experts discovered the first mobile malware families linked to Russia’s Gamaredon Pierluigi Paganini December 13, 2024 The Russia-linked APT Gamaredon…