Author: Cybernoz
CAPTCHAs, or Completely Automated Public Turing tests, are widely used online to verify that users are human rather than bots. …
In January 2023, they published the initial results of their work, an enormous collection of web vulnerabilities affecting Kia, Honda,…
The original threat actor behind the Octo malware family has released a new variant, Octo2, with enhanced stability for remote…
The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the Zerologon vulnerability, allowing them to gain…
A campaign group set up by the children of subpostmasters who had their lives ruined by the Post Office scandal…
Ranveer Allahbadia, the popular figure behind the YouTube channels BeerBiceps and his main channel, became a victim of a cyberattack….
Kryptina RaaS, a free and open-source RaaS platform for Linux, initially struggled to attract attention. Still, after a Mallox affiliate’s…
Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often…
TeamTNT is targeting CentOS VPS clouds with SSH brute force attacks. It has uploaded a malicious script that disables security,…
Researchers are tracking a Russian threat actor deploying domains involved in crypto scams targeting the US Presidential Election and tech…
Sep 26, 2024Ravie LakshmananCloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using…
C2 frameworks, crucial for post-exploitation operations, offer open-source alternatives to Cobalt Strike. They streamline the management of compromised systems, enable…











