Author: Cybernoz

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’ – Krebs on Security
27
Aug
2024

New 0-Day Attacks Linked to China’s ‘Volt Typhoon’ – Krebs on Security

Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service…

Chinese Volt Typhoon
27
Aug
2024

Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors

The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of…

Extending zero-trust principles to endpoints
27
Aug
2024

Extending zero-trust principles to endpoints

In the modern workplace, the proliferation of endpoints has significantly expanded the attack surface, presenting new security challenges for organisations….

Phishing
27
Aug
2024

Microsoft Sway abused in massive QR code phishing campaign

​A massive QR code phishing campaign abused Microsoft Sway, a cloud-based tool for creating online presentations, to host landing pages…

toll booth
27
Aug
2024

SMS scammers use toll fees as a lure

In April 2024, the FBI warned about a new type of smishing scam. Smishing is the term we use for…

CTEM in the Spotlight
27
Aug
2024

How Gartner’s New Categories Help to Manage Exposures

Want to know what’s the latest and greatest in SecOps for 2024? Gartner’s recently released Hype Cycle for Security Operations…

Cisco to Acquire AI Application Security Platform Robust Intelligence
27
Aug
2024

Cisco to Acquire AI Application Security Platform Robust Intelligence

Cisco has announced its intent to acquire Robust Intelligence, a leader in AI application security. This acquisition aligns with Cisco’s…

Cheana Stealer
27
Aug
2024

Microsoft 365 Flags Emails with Images as Malware

Microsoft 365 users have reported a troubling issue in which email messages containing images are incorrectly flagged as malware and…

Encryption of Data at Rest: The Cybersecurity Last Line of Defense
27
Aug
2024

Encryption of Data at Rest: The Cybersecurity Last Line of Defense

Defending business against cyberattack Encryption of Data at Rest: The Cybersecurity Last Line of Defense In the ever-evolving landscape of…

Most Ransomware Attacks Occur When Security Staff Are Asleep
27
Aug
2024

Most Ransomware Attacks Occur When Security Staff Are Asleep

27 Aug Most Ransomware Attacks Occur When Security Staff Are Asleep Posted at 08:46h in Blogs by Di Freeze This…

TDECU logo
27
Aug
2024

TDECU data breach affects half a million people

The Texas Dow Employees Credit Union (TDECU) has filed a data breach notification, reporting that the data of 500,474 people…

Government backs Danish version of ChatGPT
27
Aug
2024

Government backs Danish version of ChatGPT

Denmark’s Chamber of Commerce, Dansk Erhverv, is fronting a national consortium of state and private organisations to launch a Danish…