Author: Cybernoz

Hackerone logo
01
Oct
2024

NIS2: Next Step Forward on EU Security Requirements

NIS2 focuses on strengthening EU resilience through new and amended obligations for cybersecurity risk management practices, incident reporting, and security…

Windows 11
01
Oct
2024

Windows 11 24H2 now rolling out, here are the new features

Today, Microsoft announced the release of Windows 11, version 24H2, the next feature update for its operating system (also known…

Beware Of Fake Google Chrome Update That Delivers Malware
01
Oct
2024

Beware Of Fake Google Chrome Update That Delivers Malware

An ongoing fake Google Chrome update effort targeting France has been noticed, which spreads WarmCookie malware via compromised websites. WarmCookie…

ICE Signs $2 Million Contract With Spyware Maker Paragon Solutions
01
Oct
2024

ICE Signs $2 Million Contract With Spyware Maker Paragon Solutions

Paragon was founded in 2019 by veterans from the Israel Defense Forces’ powerful intelligence Unit 8200 with the active involvement…

Hospital
01
Oct
2024

Ransomware attack forces UMC Health System to divert some patients

Texas healthcare provider UMC Health System was forced to divert some patients to other locations after a ransomware attack impacted…

8220 Hacker Group Added Hadooken & K4Spreader Tools To Their Arsenal
01
Oct
2024

8220 Hacker Group Added Hadooken & K4Spreader Tools To Their Arsenal

The 8220 hacker group is known for targeting both Windows and Linux web servers by deploying “crypto-jacking” malware to exploit…

Notorious Evil Corp Hackers Targeted NATO Allies for Russian Intelligence
01
Oct
2024

Notorious Evil Corp Hackers Targeted NATO Allies for Russian Intelligence

International law enforcement has worked for years to disrupt the cybercriminal gang Evil Corp and its egregious global crime spree….

Building Your First Web Application with Yii Framework
01
Oct
2024

Building Your First Web Application with Yii Framework

Did you know that over 80% of web applications fail due to poor planning and execution? Now imagine a framework…

AI-Powered Rhadamanthys Stealer
01
Oct
2024

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition

The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence…

Hackerone logo
01
Oct
2024

How To Find Broken Access Control Vulnerabilities in the Wild

What Is Broken Access Control? BAC is a class of application vulnerability where a function or asset in the application…

Hacker in a suit
01
Oct
2024

Evil Corp hit with new sanctions, BitPaymer ransomware charges

The Evil Corp cybercrime syndicate has been hit with new sanctions by the United States, United Kingdom, and Australia, with…

New Variant Of XWorm Delivered Via Windows Script File
01
Oct
2024

New Variant Of XWorm Delivered Via Windows Script File

XWorm refers to a type of malware that has been analyzed for its obfuscation techniques and potential impacts on systems….