Author: Cybernoz

Researchers Decoded Stealthy Memory Malware PEAKLIGHT
24
Aug
2024

Researchers Decoded Stealthy Memory Malware PEAKLIGHT

Cybersecurity analysts at Mandiant recently identified a stealthy memory malware dubbed “PEAKLIGHT.” A Stealth memory malware is often referred to…

24
Aug
2024

Data Leaked In NPD Breach Could Be Used In Cyber Warfare

Global geopolitical tensions are as bad as they’ve been in a long time. In this context, cyber warfare threatens our…

Meta Exposes Iranian Hacker Group Targeting Global Political Figures on WhatsApp
24
Aug
2024

Meta Exposes Iranian Hacker Group Targeting Global Political Figures on WhatsApp

Aug 24, 2024Ravie LakshmananElection Security / Threat Intelligence Meta Platforms on Friday became the latest company after Microsoft, Google, and…

Versa Director Vulnerability
24
Aug
2024

CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

Aug 24, 2024Ravie LakshmananVulnerability / Government Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a security flaw…

Russian national arrested in Argentina for laundering money of crooks and Lazarus APT
24
Aug
2024

Russian national arrested in Argentina for laundering money of crooks and Lazarus APT

Russian national arrested in Argentina for laundering money of crooks and Lazarus APT Pierluigi Paganini August 24, 2024 A Russian…

Best Practices for Event Logging & Threat Detection
24
Aug
2024

Best Practices for Event Logging & Threat Detection

The National Security Agency (NSA) has released the Best Practices for Event Logging and Threat Detection across cloud services, enterprise…

U.S. DOJ Sues Georgia Tech For Cybersecurity Failings
24
Aug
2024

U.S. DOJ Sues Georgia Tech For Cybersecurity Failings

The U.S. Department of Justice has filed a lawsuit against the Georgia Institute of Technology – better known as Georgia…

Zimbabwe Officials Trained In 4-Day Cybersecurity Session
24
Aug
2024

Zimbabwe Officials Trained In 4-Day Cybersecurity Session

Zimbabwe’s government has taken a significant step to prioritize the growth of national cybersecurity capabilities by conducting a program where…

Shimano Di2 Bicycles
24
Aug
2024

Researchers Discover Vulnerability In Shimano Di2 Bicycles

Researchers have recently uncovered vulnerabilities in the popular Shimano Di2 electronic gear-shifting system, raising concerns about the security of these…

Qilin ransomware steals credentials stored in Google Chrome
24
Aug
2024

Qilin ransomware steals credentials stored in Google Chrome

Qilin ransomware steals credentials stored in Google Chrome Pierluigi Paganini August 23, 2024 Sophos researchers investigated a Qilin ransomware breach…

Ham radio user
23
Aug
2024

American Radio Relay League confirms $1 million ransom payment

Image: Midjourney The American Radio Relay League (ARRL) confirmed it paid a $1 million ransom to obtain a decryptor to…

innovator-spotlight-armorcode
23
Aug
2024

Innovator Spotlight: ArmorCode – Cyber Defense Magazine

As the world of software development accelerates, the need to secure applications from the earliest stages of development has become…