Author: Cybernoz

Secret Blizzard Hackers Attack Windows Infrastructure Using Multiple Hacking Tools
05
Dec
2024

Secret Blizzard Hackers Attack Windows Infrastructure Using Multiple Hacking Tools

In a recent joint report by Microsoft Threat Intelligence and Black Lotus Labs, new insights have emerged about “Secret Blizzard,”…

UK Disrupts Global Crime Networks
05
Dec
2024

UK Disrupts Global Crime Networks

The UK’s National Crime Agency (NCA) has disrupted two extensive Russian money laundering networks that operated across continents, aiding criminals…

Beware Of New HR Payroll Phishing Attack Targeting Numerous Employees
05
Dec
2024

Beware Of New HR Payroll Phishing Attack Targeting Numerous Employees

A sophisticated phishing campaign dubbed “Payroll Pirates” is currently targeting employees of various high-profile organizations. While the targets include California…

Flaws in Zyxel, ProjectSend, and CyberPanel
05
Dec
2024

CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel

Dec 05, 2024Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple security flaws affecting…

Naveen Goud
05
Dec
2024

FBI asks users to stop exchanging texts between Android and iPhones

The Federal Bureau of Investigation (FBI) has issued a strong warning to smartphone users, urging them to avoid sending regular…

How the Shadowserver Foundation helps network defenders with free intelligence feeds
05
Dec
2024

How the Shadowserver Foundation helps network defenders with free intelligence feeds

In this Help Net Security interview, Piotr Kijewski, CEO of The Shadowserver Foundation, discusses the organization’s mission to enhance internet…

NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions
05
Dec
2024

NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions

Dec 05, 2024Ravie LakshmananCryptocurrency / Financial Crime The U.K. National Crime Agency (NCA) on Wednesday announced that it led an…

Preparing for Q-day: The essential role of cloud migration in securing enterprise data
05
Dec
2024

Preparing for Q-day: The essential role of cloud migration in securing enterprise data

As the era of quantum computing draws closer, businesses face a new and unprecedented threat to data security: “Q-day.” This…

Generated AI
05
Dec
2024

Voice Cloning, Fake Videos & More: AI Is Making Scams Unstoppable

The FBI has issued a new warning about the increasing use of artificial intelligence (AI) in online fraud schemes, which…

Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data
05
Dec
2024

Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. Citizens Data

A Chinese hacking campaign, codenamed “Salt Typhoon” by Microsoft, has infiltrated more than 8 American telecommunications companies, stealing vast amounts…

Pegasus Spyware
05
Dec
2024

NSO Group’s Pegasus Spyware Detected in New Mobile Devices

Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed “Rainbow Ronin”),…

Jane Devry
05
Dec
2024

Radiant Logic Unveils Real-Time Identity Data Lake for Enhanced Identity Security Posture Management

Radiant Logic, a pioneer in Identity Security Posture Management (ISPM), has announced an innovative upgrade to its flagship RadiantOne platform:…