Author: Cybernoz

UK government study reveals 50,000 people employed in AI sector
30
Mar
2023

UK government study reveals 50,000 people employed in AI sector

Over 50,000 people work at 3,170 artificial intelligence (AI) companies in the UK, which combined to generate £10bn in revenues…

SSRF AWS Metadata
30
Mar
2023

SSRF Through PDF Generation

This week on a BugBounty program which I left aside I found my first SSRF, here is my writeup. Recon…

30
Mar
2023

3CX customers targeted via trojanized desktop app

Suspected state-sponsored threat actors have trojanized the official Windows desktop app of the widely used 3CX softphone solution, a number…

AlienFox Malware
30
Mar
2023

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

Mar 30, 2023Ravie LakshmananCloud Security / Cyber Threat A new “comprehensive toolset” called AlienFox is being distributed on Telegram as…

3CX unified comms users hit by supply chain attacks
30
Mar
2023

3CX unified comms users hit by supply chain attacks

Customers of 3CX, a unified communications technology supplier, are being targeted by a North Korea-linked advanced persistent threat (APT) actor…

New Burp Suite API: we want your feedback! | Blog
30
Mar
2023

New Burp Suite API: we want your feedback! | Blog

Sean Burns | 08 December 2022 at 10:45 UTC If you follow the Burp Suite roadmap, then you’ll know that…

Fox
30
Mar
2023

New AlienFox toolkit steals credentials for 18 cloud services

A new modular toolkit called ‘AlienFox’ allows threat actors to scan for misconfigured servers to steal authentication secrets and credentials…

30
Mar
2023

LOKKER Web Privacy Risk Score helps organizations measure and mitigate online privacy threats

LOKKER has released its LOKKER Web Privacy Risk Score, the assessment tool that provides businesses with a clear, numeric rating…

Multi-Extortion Report
30
Mar
2023

Multi-Extortion Tactics On A Rise, Data Theft Up By 70%

Multi-extortion has been increasing, and companies are harassed in many ways to extract a ransom payment in return. Ransomware attacks…

The World's 1st Open Source Bug Bounty Guide - Methodology, Tools, Resources by Mik317 (50+ CVEs)
30
Mar
2023

The World’s 1st Open Source Bug Bounty Guide – Methodology, Tools, Resources by Mik317 (50+ CVEs)

The World’s 1st Open Source Bug Bounty Guide – Methodology, Tools, Resources by Mik317 (50+ CVEs) Source link

30
Mar
2023

The best defense against cyber threats for lean security teams

H0lyGh0st, Magecart, and a slew of state-sponsored hacker groups are diversifying their tactics and shifting their focus to… you. That…

3CX Desktop App
30
Mar
2023

3CX Desktop App Supply Chain Attack Leaves Millions at Risk

Mar 30, 2023Ravie LakshmananSupply Chain / Software Security 3CX said it’s working on a software update for its desktop app…