Author: Cybernoz
Apr 03, 2024NewsroomBrowser Security / Session Hijacking Google on Tuesday said it’s piloting a new feature in Chrome called Device…
Google fixed two actively exploited Pixel vulnerabilities Pierluigi Paganini April 03, 2024 Google addressed several vulnerabilities in Android and Pixel…
A premium WordPress plugin named LayerSlider, used in over one million sites, is vulnerable to unauthenticated SQL injection, requiring admins…
New research by Netskope Threat Labs has revealed that IoT botnets, remote access tools and infostealers were the key malware…
New Sophos report reveals a problematic trend: ransomware attackers are increasingly targeting backups, crippling organizations’ ability to recover data and…
The Indian Ministry of External Affairs has issued a stern warning regarding a surge in cybercrime activities under the guise…
Apr 03, 2024NewsroomData Breach / Incident Response The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series…
The shortage of women working in the technology sector is all-too-well documented. The numbers still haven’t shifted for the better, even…
The New Version of JsOutProx is Attacking Financial Institutions in APAC and MENA via Gitlab Abuse Pierluigi Paganini April 03,…
What Is XZ Utils and What Happened? XZ Utils is an open source software commonly found in most Linux distros,…
Bug bounty programs have emerged as a powerful tool in the cybersecurity arsenal, empowering organizations to proactively identify and resolve…
IT security software company Ivanti has released patches to fix multiple security vulnerabilities impacting its Connect Secure and Policy Secure…











