Author: Cybernoz
@kinugawamasato가 정말 멋진 페이로드를 가지고 왔습니다. 최근 글 XSS Bypass: alert_?_(45)에서 이야기 드렸듯이 요즘 XSS 벡터에 대한 리서치가 활발해지고 있는데요,…
A massive phishing campaign dubbed “EchoSpoofing” exploited now-fixed, weak permissions in Proofpoint’s email protection service to dispatch millions of spoofed emails…
A large-scale cyberattack orchestrated by Ukrainian intelligence led to disruptions in the Russian banking sector. According to a source from…
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email…
The UK and 90 other countries have reached the first ever global digital trade agreement, after five years of negotiations…
Draper, Utah-based HealthEquity, a prominent financial technology and business services company, has confirmed a significant data breach affecting millions of…
Due to their widespread use, popular productivity tools are often targeted and attacked by hackers. These tools create a large…
Long-distance internet cables in France have been cut in an act of sabotage, causing disruption to internet services across the…
29 Jul Securing India’s Move To The Cloud Posted at 08:59h in Blogs by Di Freeze This week in cybersecurity…
CVE-2023-45249, a critical vulnerability affecting older versions of Acronis Cyber Infrastructure, is being exploited by attackers. About Acronis Cyber Infrastructure…
Atlanta, GA – July 26, 2024 – Cyble, a leading cyber threat intelligence 2024 provider, has been named the Leader…
Researchers identified a new attack campaign (“Operation ShadowCat”) using malicious LNK files distributed via spam emails, which triggers a PowerShell…











