Author: Cybernoz

Threat Actors Using OS Command Injection Vulnerabilities To Compromise Systems
29
Jul
2024

Threat Actors Using OS Command Injection Vulnerabilities To Compromise Systems

By exploiting OS command injection vulnerabilities, threat actors can run arbitrary commands on a host operating system to obtain unauthorized…

RaspAP Flaw-Hackers Escalate Privileage with Raspberry Pi Devices
29
Jul
2024

RaspAP Flaw-Hackers Escalate Privileage with Raspberry Pi Devices

A critical local privilege escalation vulnerability has been discovered in RaspAP, an open-source project designed to transform Raspberry Pi devices…

UK government invests £106m in five quantum tech hubs
29
Jul
2024

UK government invests £106m in five quantum tech hubs

The government is ploughing millions of pounds into five new quantum hubs in Glasgow, Edinburgh, Birmingham, Oxford and London to…

North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence
29
Jul
2024

North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence

Onyx Sleet, a cyber espionage group also known as SILENT CHOLLIMA, Andariel, DarkSeoul, Stonefly, and TDrop2, mainly targets the military,…

Ukraine Claims Cyber Attack Disrupted Russian ATMs and Banking System
29
Jul
2024

Ukraine Claims Cyber Attack Disrupted Russian ATMs and Banking System

Ukraine launches a massive cyber attack on Russia, disrupting ATM services, online banking, and financial institutions. Reportedly, a series of…

International Quad Talks
29
Jul
2024

Quad Talks Enhance Maritime Security And Cyber Defense

In a key step to improve maritime safety in the Asia-Pacific region, top diplomats from Japan, the United States, Australia,…

Hackers Exploiting MSHTML vulnerability to Deliver Atlantida Malware
29
Jul
2024

Hackers Exploiting MSHTML vulnerability Deliver Atlantida Malware

Void Banshee, a threat actor, has been exploiting a critical MSHTML vulnerability, CVE-2024-38112, to distribute the Atlantida InfoStealer malware. This…

Hackers Attacking Users Searching For W2 Form
29
Jul
2024

Hackers Attacking Users Searching For W2 Form

A malicious campaign emerged on June 21, 2024, distributing a JavaScript file hosted on grupotefex.com, which executes an MSI installer,…

eBook: 20 tips for secure cloud migration
29
Jul
2024

eBook: 20 tips for secure cloud migration

More organizations rely on cloud platforms to reap the benefits of scalability, flexibility, availability, and reduced costs. However, cloud environments…

Malicious Python Package Attacking macOS Developers To Steal GCP Logins
29
Jul
2024

Malicious Python Package Attacking macOS Developers To Steal GCP Logins

Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive…

Microsoft 365 users targeted by phishers abusing Microsoft Forms
29
Jul
2024

Microsoft 365 users targeted by phishers abusing Microsoft Forms

There has been an uptick in phishing campaigns leveraging Microsoft Forms this month, aiming to trick targets into sharing their…

PKfail, Critical Firmware Supply-Chain Issue Let Attackers Bypass Secure Boot
29
Jul
2024

PKfail, Critical Firmware Supply-Chain Issue Let Attackers Bypass Secure Boot

Hackers often attack secure boot during the boot process to execute unauthorized code, which gives them the ability to bypass…