Author: Cybernoz

National Public data may have leaked your social secuirty number
09
Aug
2024

Stolen data from scraping service National Public Data leaked online

Cybercriminals are offering a large database for sale that may include your data without you even being aware of its…

Browser vulnerability can be used to breach local networks
09
Aug
2024

Browser vulnerability can be used to breach local networks – Security

Security researchers have uncovered a browser vulnerability impacting MacOS and Linux users that can be used to breach local networks….

Trend Micro explores sale
08
Aug
2024

Trend Micro explores sale – Security

Trend Micro, a Japanese cyber security firm with a market value of about 950 billion yen ($9.9 billion), is exploring…

Apache
08
Aug
2024

CISA warns about actively exploited Apache OFBiz RCE flaw

The U.S. Cybersecurity & Infrastructure Security Agency is warning of two vulnerabilities exploited in attacks, including a path traversal impacting…

0.0.0.0 Day flaw allows malicious websites to bypass security in major browsers
08
Aug
2024

0.0.0.0 Day flaw allows malicious websites to bypass security in major browsers

0.0.0.0 Day flaw allows malicious websites to bypass security in major browsers Pierluigi Paganini August 08, 2024 An 18-year-old bug,…

Cisco
08
Aug
2024

Exploit released for Cisco SSM bug allowing admin password changes

Cisco warns that exploit code is now available for a maximum severity vulnerability that lets attackers change any user password…

Hacker in suit
08
Aug
2024

BlackSuit ransomware behind over $500 million in ransom demands

CISA and the FBI confirmed today that the Royal ransomware rebranded to BlackSuit and has demanded over $500 million from…

5 Malware Analysis Challenges Solved by an Interactive Sandbox
08
Aug
2024

5 Malware Analysis Challenges Solved by an Interactive Sandbox

Malware analysis can be challenging, as it often requires in-depth theoretical knowledge and advanced skills. Tools like an interactive sandbox…

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
08
Aug
2024

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine

Among the other attacks created by Bargury is a demonstration of how a hacker—who, again, must already have hijacked an…

Black Hat USA 2024: Chip Flaw 'GhostWrite' Steal Steal Data from CPU Memory
08
Aug
2024

Chip Flaw ‘GhostWrite’ Steals Data from CPU Memory

Black Hat USA 2024: Critical RISC-V CPU vulnerability discovered. Dubbed GhostWrite; attackers can exploit this flaw to steal sensitive data…

CISA
08
Aug
2024

CISA warns of hackers abusing Cisco Smart Install feature

​On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recommended disabling the legacy Cisco Smart Install (SMI) feature after seeing…

Beware Of Fake WinRar Websites Delivering Ransomware via GitHub
08
Aug
2024

Beware Of Fake WinRar Websites Delivering Ransomware via GitHub

The threat actors often exploit fake websites to trick users into revealing their personal data. Not only that, but these…