Author: Cybernoz

Malicious npm Packages
30
Aug
2024

North Korean Hackers Target Developers with Malicious npm Packages

Aug 30, 2024Ravie LakshmananCryptocurrency / Malware Threat actors with ties to North Korea have been observed publishing a set of…

A Tool For Easier Incident Reporting
30
Aug
2024

A Tool For Easier Incident Reporting

The Cybersecurity and Infrastructure Security Agency (CISA) announced the launch of its new CISA Services Portal, which includes an updated…

RansomHub
30
Aug
2024

RansomHub Attacks Hit Over 200 Organizations, FBI Warns

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Multi-State Information Sharing and Analysis Center (MS-ISAC), and…

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa
30
Aug
2024

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa

Russia-linked APT29 reused iOS and Chrome exploits previously developed by NSO Group and Intellexa Pierluigi Paganini August 30, 2024 Russia-linked…

Jenkins RCE Vulnerability
30
Aug
2024

Exploiting Jenkins RCE Vulnerability (CVE-2024-43044) Via Agents

A critical vulnerability has been identified in Jenkins, a widely used automation server. If exploited further, this vulnerability allows attackers…

Naveen Goud
30
Aug
2024

How Ransomware Is Evolving into a Geopolitical Weapon

In recent years, ransomware attacks have evolved from mere cyber-criminal activities into sophisticated tools of geopolitical maneuvering. As the digital…

What is an Access Control Lists (ACLs)?
30
Aug
2024

What is Access Control List?

Access Control Lists (ACLs) are fundamental to network security and management. They are critical in determining who or what can…

Sinon: Open-source automatic generative burn-in for Windows deception hosts
30
Aug
2024

Sinon: Open-source automatic generative burn-in for Windows deception hosts

Sinon is an open-source, modular tool for the automatic burn-in of Windows-based deception hosts. It aims to reduce the difficulty…

VirusTotal for Threat Research
30
Aug
2024

VirusTotal for Threat Research – A Comprehensive Guide 2024

VirusTotal is an essential tool for cybersecurity professionals. It offers a comprehensive platform for analyzing files, URLs, domains, and IP…

A macro look at the most pressing cybersecurity risks
30
Aug
2024

A macro look at the most pressing cybersecurity risks

Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks…

Cyber threats that shaped the first half of 2024
30
Aug
2024

Cyber threats that shaped the first half of 2024

Global cybercrime has shown no sign of decline and is expected to grow strong per year over the next five…

Rocinante Malware Taking Over The Android Device Remotely
30
Aug
2024

Rocinante Malware Taking Over The Android Device Remotely

The ever-evolving malware landscape is evolving at an alarming rate, as a multitude of new strains have already been noticed….