Author: Cybernoz

GHOSTSPIDER Malware
26
Nov
2024

Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries

The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER as part…

Emergency Vehicle Lights Can Screw Up a Car's Automated Driving System
26
Nov
2024

Emergency Vehicle Lights Can Screw Up a Car’s Automated Driving System

Tesla, which disbanded its public relations team in 2021, did not respond to WIRED’s request for comment. The camera systems…

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks
26
Nov
2024

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims to fake login pages hosted…

A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats
26
Nov
2024

A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

Nov 26, 2024The Hacker NewsPentest / Vulnerability Assessment When CVEs go viral, separating critical vulnerabilities from the noise is essential…

Russian threat actors poised to cripple power grid, UK warns
26
Nov
2024

Russian threat actors poised to cripple power grid, UK warns

The UK government has warned that cyber threat actors operating on behalf of the Russian regime have already orchestrated cyber…

CISA Adds CVE-2023-28461 Vulnerability To KEV Catalog
26
Nov
2024

CISA Adds CVE-2023-28461 Vulnerability To KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a critical security flaw, CVE-2023-28461, to its Known Exploited…

BleepingComputer.com logo
26
Nov
2024

Page not found

Page not found Unfortunately the page that you requested does not exist. Don’t worry, though, we have some great suggestions…

Hackers Weaponizing Typosquatted Libraries To Inject SSH Backdoors
26
Nov
2024

Hackers Weaponizing Typosquatted Libraries To Inject SSH Backdoors

A sophisticated attack targeting npm users has been recently uncovered by the Socket’s threat research team in a concerning development…

200,000 WordPress Sites Exposed to Cyber Attack, Following Plugin Vulnerability
26
Nov
2024

200,000 WordPress Sites Exposed to Cyber Attack, Following Plugin Vulnerability

A critical security vulnerability has been discovered in the popular WordPress plugin Anti-Spam by CleanTalk, which is installed on over 200,000…

Navigating the NIS2 Directive: A comprehensive guide for UK businesses
26
Nov
2024

Navigating the NIS2 Directive: A comprehensive guide for UK businesses

The tech regulatory landscape is constantly evolving, with the imminent Network and Information Security 2 Directive, more widely known as…

Tips and Tools for Social Media Safety
26
Nov
2024

Tips and Tools for Social Media Safety

Social media is where we connect, share, and sometimes overshare. It’s a space to celebrate birthdays, post selfies, or argue…

Naveen Goud
26
Nov
2024

Starbucks targeted by a ransomware attack

A recent ransomware attack targeting Blue Yonder, a company providing supply chain software, has caused notable disruptions in the IT…