Author: Cybernoz

Naveen Goud
02
Aug
2024

Russian ransomware criminals earn $500 million

In recent reports, our Cybersecurity Insiders have detailed how hackers have been generating revenue through cyberattacks such as ransomware. However,…

Fake Google Authenticator Sites Spreading DeerStealer Malware
02
Aug
2024

Fake Google Authenticator Sites Spreading DeerStealer Malware

Researchers from ANY RUN identified a malware distribution campaign dubbed DeerStealer that leverages deceptive websites masquerading as legitimate Google Authenticator…

Avtech camera vulnerability actively exploited in the wild, CISA warns
02
Aug
2024

Avtech camera vulnerability actively exploited in the wild, CISA warns

Avtech camera vulnerability actively exploited in the wild, CISA warns Pierluigi Paganini August 02, 2024 CISA warned that an Avtech…

CrowdStrike
02
Aug
2024

CrowdStrike sued by investors over massive global IT outage

Cybersecurity company CrowdStrike has been sued by investors who say it provided false claims about its Falcon platform after a bad security…

Tricky OneDrive Phishing Campaign Tricks Users To Execute PowerShell Script
02
Aug
2024

Tricky OneDrive Phishing Campaign Tricks Users To Execute PowerShell Script

A sophisticated phishing campaign targets Microsoft OneDrive users, employing social engineering to trick victims into executing malicious PowerShell scripts.  The…

Jane Devry
02
Aug
2024

How Advanced Data Protection Revolutionizes Security Analysts’ Workflow

A recent study revealed that employees typically download around 30GB of data monthly from SaaS applications to their devices, including…

Labour should focus on talent to improve UK's cyber posture
02
Aug
2024

Labour should focus on talent to improve UK’s cyber posture

Critically, in today’s world, cyber security is a fundamental part of statecraft and the responsibility of the government. That being…

Leading Silver Producer Fresnillo PLC Suffer Cyberattack
02
Aug
2024

Leading Silver Producer Fresnillo PLC Suffer Cyberattack

Fresnillo PLC, the world’s largest primary silver producer, and Mexico’s largest gold producer has announced that it has been the…

Heap Exploitation Techniques From HitconCTF Qualifiers 2024
02
Aug
2024

Heap Exploitation Techniques From HitconCTF Qualifiers 2024

The realm of heap exploitation has always intrigued security researchers due to its complexity and the potential for high-impact vulnerabilities….

DEV#POPPER Attacking developers via New Social Engineering Tactics
02
Aug
2024

DEV#POPPER Attacking developers via New Social Engineering Tactics

Threat actors masquerade as interviewers and send a ZIP file (onlinestoreforhirog.zip) to candidates as part of a fake interview, which…

Watch The "History Of Cryptography" Documentary
02
Aug
2024

Watch The “History Of Cryptography” Documentary

02 Aug Watch The “History Of Cryptography” Documentary Posted at 08:57h in Blogs by Di Freeze This week in cybersecurity…

New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication
02
Aug
2024

New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication

Aug 02, 2024Ravie LakshmananCyber Attack / Windows Security Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a…