Author: Cybernoz

Beware Of Fake Verify You Are A Human Request That Delivers Malware
26
Sep
2024

Beware Of Fake Verify You Are A Human Request That Delivers Malware

CAPTCHAs, or Completely Automated Public Turing tests, are widely used online to verify that users are human rather than bots. …

Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug
26
Sep
2024

Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug

In January 2023, they published the initial results of their work, an enormous collection of web vulnerabilities affecting Kia, Honda,…

Octo2 Android Malware Attacking To Steal Banking Credentials
26
Sep
2024

Octo2 Android Malware Attacking To Steal Banking Credentials

The original threat actor behind the Octo malware family has released a new variant, Octo2, with enhanced stability for remote…

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus
26
Sep
2024

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the Zerologon vulnerability, allowing them to gain…

Fujitsu accused of ‘paying lip service’ to Post Office scandal victims
26
Sep
2024

Fujitsu accused of ‘paying lip service’ to Post Office scandal victims

A campaign group set up by the children of subpostmasters who had their lives ruined by the Post Office scandal…

Ranveer Allahbadia YouTube Channel Hack
26
Sep
2024

Ranveer Allahbadia YouTube Channel Hack: What Happened And What’s Next

Ranveer Allahbadia, the popular figure behind the YouTube channels BeerBiceps and his main channel, became a victim of a cyberattack….

New Mallox Ransomware Linux Variant Attacking Enterprise Linux Servers
26
Sep
2024

New Mallox Ransomware Linux Variant Attacking Enterprise Linux Servers

Kryptina RaaS, a free and open-source RaaS platform for Linux, initially struggled to attract attention. Still, after a Mallox affiliate’s…

New MIT protocol protects sensitive data during cloud-based computation
26
Sep
2024

New MIT protocol protects sensitive data during cloud-based computation

Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often…

TeamTNT Hackers Attacking VPS Servers Running CentOS
26
Sep
2024

TeamTNT Hackers Attacking VPS Servers Running CentOS

TeamTNT is targeting CentOS VPS clouds with SSH brute force attacks. It has uploaded a malicious script that disables security,…

Russian Hackers Registering Domains Targeting US Tech Brands
26
Sep
2024

Russian Hackers Registering Domains Targeting US Tech Brands

Researchers are tracking a Russian threat actor deploying domains involved in crypto scams targeting the US Presidential Election and tech…

India-Linked Hackers
26
Sep
2024

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

Sep 26, 2024Ravie LakshmananCloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using…

Open Source C2 Frameworks Used In Red Teaming Assessments Vulnerable To RCE Attacks
26
Sep
2024

Open Source C2 Frameworks Used In Red Teaming Assessments Vulnerable To RCE Attacks

C2 frameworks, crucial for post-exploitation operations, offer open-source alternatives to Cobalt Strike. They streamline the management of compromised systems, enable…