Author: Cybernoz

Tracki logo
19
Aug
2024

Hacked GPS tracker reveals location data of customers

Stalkerware researcher maia arson crimew strikes again. Big time. We know maia as a researcher that loves to go after…

19
Aug
2024

Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware

Aug 19, 2024Ravie LakshmananMalvertising / Cybercrime Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing…

Popular Microsoft apps for Mac at risk of code injection attacks
19
Aug
2024

Popular Microsoft apps for Mac at risk of code injection attacks

Several Microsoft applications designed specifically for the Apple macOS operating system are at risk of being subverted by malicious actors,…

Airplane
19
Aug
2024

FlightAware configuration error leaked user data for years

Flight tracking platform FlightAware is asking some users to reset their account login passwords due to a data security incident…

Windows Secure Channel Vulnerability
19
Aug
2024

Windows Secure Channel RCE Vulnerability

A recent analysis of a security vulnerability in Microsoft’s Secure Channel revealed a critical flaw that could be exploited for…

Lazarus Hacker Group Exploited Microsoft Windows Zero-day
19
Aug
2024

Lazarus Hacker Group Exploited Microsoft Windows Zero-day

The notorious Lazarus hacker group has been identified as exploiting a zero-day vulnerability in Microsoft Windows, specifically targeting the Windows…

AI SPERA and Hackers Central Partner to Expand Mexico’s Security Market with 'Criminal IP ASM'
19
Aug
2024

AI SPERA and Hackers Central Partner to Expand Mexico’s Security Market with ‘Criminal IP ASM’

Torrance, United States / California, August 19th, 2024, CyberNewsWire AI SPERA, a leading Cyber Threat Intelligence (CTI) company, has announced…

Own proactively detects and stores data changes in Salesforce
19
Aug
2024

Own proactively detects and stores data changes in Salesforce

Own released Continuous Data Protection for Salesforce customers, further strengthening its product offering to include recovery and analysis capabilities. Own…

UULoader Malware
19
Aug
2024

New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia

Aug 19, 2024Ravie LakshmananThreat Intelligence / Cryptocurrency A new type of malware called UULoader is being used by threat actors…

Internal And External Threat Intelligence
19
Aug
2024

Internal And External Threat Intelligence

How To Balance the Two Sources In cybersecurity, threat intelligence covers a broad range of activities concerning collection, analysis, and…

Palo Alto Networks CEO Says Hackers Can "Get In And Out" In Three Hours
19
Aug
2024

Palo Alto Networks CEO Says Hackers Can “Get In And Out” In Three Hours

19 Aug Palo Alto Networks CEO Says Hackers Can “Get In And Out” In Three Hours Posted at 08:34h in…

Hackers Exploit Email URL Rewriting to Insert Phishing Links
19
Aug
2024

Hackers Exploit Email URL Rewriting to Insert Phishing Links

Hackers have found a way to exploit email URL rewriting features, a tool initially designed to protect users from phishing…