Author: Cybernoz

IIT Kanpur And NPTI Partner For Power Grid Cybersecurity
27
Jul
2024

IIT Kanpur And NPTI Partner For Power Grid Cybersecurity

The Indian Institute of Technology, Kanpur (IITK), and the National Power Training Institute (NPTI) have signed a Memorandum of Understanding…

Gemini Data Breach Highlights Risks In Crypto Industry
27
Jul
2024

Gemini Data Breach Highlights Risks In Crypto Industry

Cryptocurrency exchange Gemini has disclosed a data breach incident that occurred due to a cyberattack on its Automated Clearing House…

FBCS Data Breach Victims Surge To 4.2 Million
27
Jul
2024

FBCS Data Breach Victims Surge To 4.2 Million

Debt collection agency Financial Business and Consumer Solutions (FBCS) has revealed that the number of people impacted by the data…

Two-Step Phishing Attacks
27
Jul
2024

Hackers Use Microsoft Forms for Two-Step Phishing Attacks

Cybercriminals are increasingly using Microsoft Office Forms to launch sophisticated two-step phishing attacks. At present, certain individuals are being tricked…

How To Fix Google Chrome Browser Password Manager Issue
27
Jul
2024

How To Fix Google Chrome Browser Password Manager Issue

Google has successfully resolved a significant issue affecting the Chrome Browser password manager, which left a substantial number of users…

Threat Actors Exploiting Selenium Grid Services For Cryptomining
27
Jul
2024

Threat Actors Exploiting Selenium Grid Services For Cryptomining

Threat actors often exploit the cloud services for cryptomining, as doing so allows them to abuse the huge computational resources…

PlugX Malware
27
Jul
2024

French Authorities Launch Operation to Remove PlugX Malware from Infected Systems

Jul 27, 2024NewsroomMalware / Cyber Intelligence French judicial authorities, in collaboration with Europol, have launched a so-called “disinfection operation” to…

How GenAI Can Be A CISO's Best Friend And Worst Enemy
27
Jul
2024

How GenAI Can Be A CISO’s Best Friend And Worst Enemy

By Neelesh Kripalani, Chief Technology Officer, Clover Infotech According to Gartner, by 2027, Generative AI (GenAI) will contribute to a…

Beware Of Malicious Chrome Installer From Chinese Hackers
27
Jul
2024

Beware Of Malicious Chrome Installer From Chinese Hackers

A malicious Chrome installer, ChromeSetup.msi, distributed via drive-by download, delivers a novel Gh0st RAT variant, dubbed Gh0stGambit, that evasively retrieves…

Malicious PyPI Package
27
Jul
2024

Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials

Jul 27, 2024NewsroomCybersecurity / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository…

CISO Role In Security Measures: Compliance And Growth
27
Jul
2024

CISO Role In Security Measures: Compliance And Growth

By Ankur Ahuja, Senior Vice President (SVP) and CISO, Billtrust The Chief Information Security Officer (CISO) in private equity portfolio…

Essential Tips For Buying Second-Hand Devices Safely
27
Jul
2024

Essential Tips For Buying Second-Hand Devices Safely

As technology evolves rapidly, high-end devices often come with hefty price tags, making second-hand options an attractive alternative. Buying pre-owned…