Author: Cybernoz

OVHcloud mitigated record-breaking DDoS attack in April 2024
04
Jul
2024

OVHcloud mitigated record-breaking DDoS attack in April 2024

OVHcloud mitigated a record-breaking DDoS attack in April 2024 Pierluigi Paganini July 04, 2024 OVHcloud successfully mitigated a record-breaking DDoS…

RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations
04
Jul
2024

RSA Conference 2024 Highlights: Cutting-Edge Cybersecurity Innovations

AI in Action: Real-World Breakthroughs and Innovations Attending the RSA Conference for the first time was an incredible experience! Ever…

Applle Notice to LeVPN
04
Jul
2024

Apple Removes VPN Apps From Russian App Store At Its Media Watchdogs Demands

In a move that tightens Russia’s grip on internet control, Apple has removed several Virtual Private Network (VPN) applications from…

Ethereum mailing list breach exposes 35,000 to crypto draining attack
04
Jul
2024

Ethereum mailing list breach exposes 35,000 to crypto draining attack

A threat actor compromised Ethereum’s mailing list provider and sent to over 35,000 addresses a phishing email with a link…

Operation Morpheus Disrupts 593 Cobalt Strike Servers Used for Ransomware
04
Jul
2024

Operation Morpheus Disrupts 593 Cobalt Strike Servers Used for Ransomware

Global Operation Morpheus dismantles Cobalt Strike network: Law enforcement takes down criminal infrastructure used for ransomware and data breaches. In…

Naveen Goud
04
Jul
2024

IBM and Microsoft pledge to offer Cloud Data Protection

As cloud adoption continues to surge, so do concerns about data security. These concerns are amplified for businesses adopting hybrid…

UK data regulator should investigate police cloud deployments
04
Jul
2024

UK data regulator should investigate police cloud deployments

Scottish biometrics commissioner Brian Plastow is calling for the UK data regulator to formally investigate whether Police Scotland’s cloud-based Digital…

Mitsubishi Electric Vulnerabilities In GENESIS64 And MC Works64
04
Jul
2024

Mitsubishi Electric Vulnerabilities In GENESIS64 And MC Works64

Mitsubishi Electric’s GENESIS64 and MC Works64 software have been identified with multiple vulnerabilities, posing significant security risks to industrial control…

Beware Of Malicious PDF Files That Mimic As Microsoft 2FA Security Update
04
Jul
2024

Beware Of Malicious PDF Files That Mimic As Microsoft 2FA Security Update

Malware authors are exploiting the growing popularity of QR codes to target users through PDF files, where these malicious PDFs,…

ShinyHunters Leak 33M Twilio Authy Phone Numbers, Neiman Marcus and Truist Bank Data
04
Jul
2024

ShinyHunters Leak 33M Twilio Authy Phone Numbers, Neiman Marcus and Truist Bank Data

ShinyHunters hackers have taken responsibility for three high-profile data breaches involving Neiman Marcus, Truist Bank, and Twilio Authy, compromising personal…

Addressing XPath Expression Injection Vulnerabilities
04
Jul
2024

Addressing XPath Expression Injection Vulnerabilities

Widely used open-source Java tools, GeoServer and GeoTools, that help in geospatial data processing have fixed security vulnerabilities related to…

Kematian Stealer Abuses Powershell Tool for Covert Data Exfiltration
04
Jul
2024

Kematian Stealer Abuses Powershell for Covert Data Exfiltration

The Kematian Stealer has emerged as a sophisticated PowerShell-based malware that covertly exfiltrates sensitive data from compromised systems. This article…