Author: Cybernoz

Microsoft and CrowdStrike hit back at Delta’s legal threats
07
Aug
2024

Microsoft and CrowdStrike hit back at Delta’s legal threats

Microsoft and CrowdStrike have defended themselves against a series of accusations by Delta, saying the US airline, which was particularly…

Hacker
07
Aug
2024

Critical Progress WhatsUp RCE flaw now under active exploitation

Threat actors are actively attempting to exploit a recently fixed  Progress WhatsUp Gold remote code execution vulnerability on exposed servers for initial…

Critical Solar Power Grid Vulnerabilities Risk Global Blackouts
07
Aug
2024

Critical Solar Power Grid Vulnerabilities Risk Global Blackouts

Cybersecurity firm Bitdefender reveals critical vulnerabilities in solar power management platforms, putting 20% of global solar production at risk. Attackers…

Naveen Goud
07
Aug
2024

Fortinet acquires Next DLP – Cybersecurity Insiders

Fortinet, a major player in the cybersecurity industry, has acquired data security startup Next DLP for an undisclosed sum. The…

Roundcube Webmail
07
Aug
2024

Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords

Aug 07, 2024Ravie LakshmananEmail Security / Vulnerability Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software…

Linux Kernel Exploit
07
Aug
2024

New Linux Kernel Exploit Technique ‘SLUBStick’ Discovered by Researchers

Aug 07, 2024Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick…

Cyber security adoption is vital to Scotland’s space race
07
Aug
2024

Cyber security adoption is vital to Scotland’s space race

It has been described in various evocative ways across popular culture, reflecting its vastness and potential for discovery. But, as…

Nexera Crypto Hack
07
Aug
2024

Nexera Crypto Hacked, But Company Claims Only $440K Stolen

In yet another significant blow to the cryptocurrency ecosystem, blockchain platform Nexera has fallen victim to a major hack. While…

Phishing Attacks Can bypass Microsoft 365 Email Safety Warnings
07
Aug
2024

Phishing Attacks Can bypass Microsoft 365 Email Safety Warnings

A vulnerability in Microsoft 365’s anti-phishing measures allows malicious actors to deceive users into opening harmful emails by hiding the…

Hackers Leveraging OneDrive Or Google Drive To Hide Malicious Traffic
07
Aug
2024

Hackers Leveraging OneDrive Or Google Drive To Hide Malicious Traffic

Attackers, including nation-state actors, increasingly leverage legitimate cloud services for espionage operations, exploiting their low-profile and cost-effective nature.  The services,…

AWS Launches Mithra To Detect Malicious Domains Across Systems
07
Aug
2024

AWS Launches Mithra To Detect Malicious Domains Across Systems

Amazon’s e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast…

What Employers and Tech Pros Are Looking For
07
Aug
2024

What Employers and Tech Pros Are Looking For

07 Aug Cybersecurity Certifications: What Employers and Tech Pros Are Looking For Posted at 09:03h in Blogs by Di Freeze…