Author: Cybernoz

week in security
10
Jun
2024

A week in security (June 3 – June 9)

June 7, 2024 – Google has announced it will delete Location History (Timeline) data and store new data locally, starting…

Frontier Communications Ransomware Attack: 750,000 Users’ Data Exposed
10
Jun
2024

Frontier Communication Ransom attack:750,000 Data Exposed

Frontier Communications Parent, Inc. (the “Company”) detected unauthorized access to portions of its information technology environment. The breach, attributed to…

Beware of Fake KMSPico Activators that Deliver Vidar Stealer Malware
10
Jun
2024

Beware of Fake KMSPico Activators that Deliver Vidar Stealer Malware

Researchers detected an attack involving a fake KMSPico activator tool, which delivered Vidar Stealer through several events. The attack leveraged…

An IT admin’s guide: Windows 10 end of support explained
10
Jun
2024

An IT admin’s guide: Windows 10 end of support explained

Every time a new version of the Windows operating system (OS) is released, the countdown clock starts ticking on the…

Sticky Werewolf
10
Jun
2024

Sticky Werewolf Expands Cyber Attack Targets in Russia and Belarus

Jun 10, 2024NewsroomCyber Espionage / Malware Cybersecurity researchers have disclosed details of a threat actor known as Sticky Werewolf that…

Absolute Telecom data breach
10
Jun
2024

Absolute Telecom Data Breach: 34GB Data Compromised

Absolute Telecom Pte Ltd, a prominent telecommunications company based in Singapore, has fallen victim to an alleged cyberattack.  The Absolute…

Radare: Open-source reverse engineering framework
10
Jun
2024

Radare: Open-source reverse engineering framework

Radare is an open-source UNIX-like reverse engineering framework and command-line toolset. It can be scripted, modified, and used for batch…

disputed cylance hack
10
Jun
2024

BlackBerry Disputes Cylance Claims, While NYT Confirms Breach

Hackers claim to have hit BlackBerry Cylance and The New York Times in separate, unrelated incidents, but only the New…

AI’s role in accelerating vulnerability management
10
Jun
2024

AI’s role in accelerating vulnerability management

With its capability to analyze, predict, and automate, AI stands to reshape many corners of business, most notably cybersecurity. In…

Why CISOs need to build cyber fault tolerance into their business
10
Jun
2024

Why CISOs need to build cyber fault tolerance into their business

CISOs who elevate response and recovery to equal status with prevention are generating more value than those who adhere to…

Bitdefender GravityZone Flaw
10
Jun
2024

Bitdefender GravityZone Flaw Let Hackers Launch SSRF Attacks

Bitdefender has recently fixed a critical Server-Side Request Forgery (SSRF) vulnerability in its GravityZone Console On-Premise, known as CVE-2024-4177. This…

Cybersecurity pros change strategies to combat AI-powered threats
10
Jun
2024

Cybersecurity pros change strategies to combat AI-powered threats

75% of security professionals had to change their cybersecurity strategy in the last year due to the rise in AI-powered…