Author: Cybernoz

Cyber security professionals share their biggest lessons of 2022
30
Dec
2022

Cyber security professionals share their biggest lessons of 2022

The past 12 months have been a trying time for cyber security professionals globally. Most notably, they’ve had to contend…

30
Dec
2022

Researchers find new ‘ProxyNotShell’ Exchange exploit – Security

Security researchers have found a new exploit that allows attackers to remotely execute code through Outlook Web Access (OWA), on…

Unpatched Citrix Servers
30
Dec
2022

Thousands of Unpatched Citrix Servers Vulnerable to Critical Flaws

Two critically important security vulnerabilities that Citrix fixed in recent months, still remain vulnerable on thousands of Citrix gateways and…

Understanding how weaponized template injection attacks operate
30
Dec
2022

Understanding How Weaponized Template Injection Attacks Operate

By Brett Raybould, EMEA Solutions Architect, Menlo Security Malicious payloads are one of the leading challenges facing organizations today. From…

Understanding the Top Operational Technology Security Needs and Methods in the Utilities Sector
30
Dec
2022

Understanding the Top Operational Technology Security Needs and Methods in the Utilities Sector

By Dominick Birolin, CISSP, CISA, NSE4 When it comes to finding and keeping the specialists necessary to defend an organization…

The Troublemaker CISO: Laziness, Failure, Great Expectations
30
Dec
2022

The Troublemaker CISO: Laziness, Failure, Great Expectations

Incident & Breach Response , Leadership & Executive Communication , Security Operations Security Director Ian Keller Rants About Bad Coding…

How Finland develops its national plan for investment in innovation
30
Dec
2022

How Finland develops its national plan for investment in innovation

In 2021, Finland set a goal of raising its expenditure on research, development and innovation (RDI) to 4% of GDP…

“The sooner you introduce security, the earlier you spot risks”
30
Dec
2022

“The sooner you introduce security, the earlier you spot risks”

Santosh Kamane is a veteran security professional with about two decades of experience in progressively building information security and risk…

30
Dec
2022

Lazarus Ransomware Taps Microsoft’s MoTW Bug to hit targets

The Lazarus Group, the infamous North Korean state-sponsored hacking group has become the latest threat group to evade Microsoft’s Mark…

30
Dec
2022

Intel splits graphic chips unit into two – Hardware

Intel is splitting its graphic chips unit into two as it realigns the business to better compete with Nvidia and…

Critical vulnerability makes it easy to hack unpatched Netgear Wireless AC Nighthawk, Wireless AX, Nighthawk routers
30
Dec
2022

Critical vulnerability makes it easy to hack unpatched Netgear Wireless AC Nighthawk, Wireless AX, Nighthawk routers

Numerous Netgear WiFi router models were susceptible to a high-severity vulnerability that had been patched by Netgear. Multiple variants of…

Indian Railways Says It's Not Source of Alleged Data Breach
30
Dec
2022

Indian Railways Says It’s Not Source of Alleged Data Breach

Critical Infrastructure Security , Cybercrime , Fraud Management & Cybercrime 30 Million Purported Passenger Records Listed for Sale on Cybercrime…