Author: Cybernoz

North Korean hackers
30
Aug
2024

North Korean hackers exploit Chrome zero-day to deploy rootkit

North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM…

The Dumbest Thing In Security: Worst Phishing Test EVER
30
Aug
2024

The Dumbest Thing In Security: Worst Phishing Test EVER

Employee cybersecurity training programs and phishing tests are usually a good thing for cyber preparedness, but one university went way…

Hackerone logo
30
Aug
2024

HackerOne’s Commitment to Learning and Development

HackerOne is committed to providing comprehensive learning and development opportunities to fuel our competitive edge and cultivate a highly skilled…

Evil hacker
30
Aug
2024

New Voldemort malware abuses Google Sheets to store stolen data

A new malware campaign is spreading a previously undocumented backdoor named “Voldemort” to organizations worldwide, impersonating tax agencies from the…

Making Progress and Losing Ground
30
Aug
2024

Making Progress and Losing Ground

As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The…

Jane Devry
30
Aug
2024

Seven Deadly Myths of DDoS Protection

Myth (noun). 1. an ancient story or set of stories, especially explaining the early history of a group of people…

WhatsApp logo
30
Aug
2024

Iranian cybercriminals are targeting WhatsApp users in spear phishing campaign

An Iranian state-sponsored group often referred to as Iran’s Islamic Revolutionary Guard Corps (IRGC) is making headlines again this season…

APT-C-60
30
Aug
2024

APT-C-60 Exploits WPS Office Zero-Day

A sophisticated cyberespionage campaign targeting East Asian countries has been uncovered, with the APT-C-60 group exploiting a zero-day vulnerability in…

Evolution of Attack Surface Management
30
Aug
2024

Evolution of Attack Surface Management

The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began…

Iranian Hackers Attacking US Organizations To Deploy Ransomware
30
Aug
2024

Iranian Hackers Attacking US Organizations To Deploy Ransomware

As of August 2024, Iran-based cyber actors continue to exploit U.S. and foreign organizations across multiple sectors. The primary sectors…

Naveen Goud
30
Aug
2024

Durex data breach leaks sensitive details of customers

Durex India, a se$ual wellness brand that sells condoms and intimate products has fallen prey to a cyber attack leaking…

Atlassian Confluence Vulnerability
30
Aug
2024

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence…