Author: Cybernoz

Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
10
Aug
2024

Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs

Demand for graphics processing units or GPUs has exploded in recent years as video rendering and artificial intelligence systems have…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
10
Aug
2024

North Korean Kimusky Group Attacking University Professors

Kimsuky, a North Korean APT group, employs targeted phishing campaigns, leveraging DMARC exploitation to conceal social engineering, infiltrate university networks,…

Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers
10
Aug
2024

Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

Aug 09, 2024Ravie LakshmananCloud Security / Data Protection Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS)…

Kubernetes at 10: CRDs at core of extensible, modular storage in K8s
10
Aug
2024

Kubernetes at 10: CRDs at core of extensible, modular storage in K8s

Kubernetes is 10! Mid-2024 sees the 10th birthday of the market-leading container orchestration platform. Xing Yang, cloud-native storage tech lead at…

Chrome
10
Aug
2024

Malware force-installs Chrome extensions on 300,000 browsers, patches DLLs

An ongoing and widespread malware campaign force-installed malicious Google Chrome and Microsoft Edge browser extensions in over 300,000 browsers, modifying the…

Critical XSS Vulnerability In Roundcube Let Attackers Execute Arbitrary Code
10
Aug
2024

Critical XSS Vulnerability In Roundcube Let Attackers Execute Arbitrary Code

Roundcube, a widely adopted open-source webmail application, is included by default in the popular cPanel web hosting control panel, leading…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
10
Aug
2024

Iranian Hackers Targeting 2024 US Election Campaigns

Microsoft has released a report detailing Iran’s efforts to influence the upcoming 2024 US presidential election. The report highlights the…

The Security Interviews: Google’s take on confidential computing
10
Aug
2024

The Security Interviews: Google’s take on confidential computing

Among the arms races taking place in the public cloud is one focused on providing the most trusted environment for…

Microsoft Office
10
Aug
2024

Microsoft discloses Office zero-day, still working on a patch

​Microsoft has disclosed a high-severity zero-day vulnerability affecting Office 2016 and later, which is still waiting for a patch. Tracked…

Threat Actors Hijacking Websites To Deliver .NET Based Malware
10
Aug
2024

Threat Actors Hijacking Websites To Deliver .NET Based Malware

Clearlake is a cyber threat operation that distributes fake antivirus software to make users perceive their system as infected. Sometimes,…

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
10
Aug
2024

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

Finally, HID says that “to its knowledge,” none of its encoder keys have leaked or been distributed publicly, and “none…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
10
Aug
2024

Confusion Attacks Vulnerability In Apache HTTP Server Allow Attackers To Gain Root Access Remotely

The Apache HTTP Server relies on hundreds of independently developed modules to handle client requests, sharing a complex data structure…