Author: Cybernoz

Gogs Vulnerabilities Let Attackers Hack Instances And Steal Source Code
03
Jul
2024

Gogs Vulnerabilities Let Attackers Hack Instances And Steal Source Code

Gogs is a standard open-source code hosting system used by many developers. Several Gogs vulnerabilities have been discovered recently by…

Multiple Flaws In Rockwell Automation Panel Let Attackers Execute Remote Code
03
Jul
2024

Multiple Flaws In Rockwell Automation Panel Let Attackers Execute Remote Code

Two vulnerabilities in Rockwell Automation PanelView Plus have been discovered. Unauthenticated attackers could exploit them remotely to perform remote code…

Data of 210,715 Customers Exposed
03
Jul
2024

Data of 210,715 Customers Exposed

TotalEnergies Clientes SAU has reported a significant cyberattack that has compromised the personal data of 210,715 customers. The incident has…

LockBit Hits Croatia's Biggest Hospital, Demands Ransom for Data
03
Jul
2024

LockBit Hits Croatia’s Biggest Hospital, Demands Ransom for Data

Croatia’s biggest hospital, Zagreb Univ. Hospital Centre, was crippled by ransomware attack. LockBit 3.0 forced shutdown and data breach. Patients…

Yahoo Still Ranks As The Largest Data Breach In History
03
Jul
2024

Yahoo Still Ranks As The Largest Data Breach In History

03 Jul Yahoo Still Ranks As The Largest Data Breach In History Posted at 09:05h in Blogs by Di Freeze…

Cyber Essentials at 10: Success or failure?
03
Jul
2024

Cyber Essentials at 10: Success or failure?

Cyber Essentials was launched in the UK to much fanfare in June 2014, aiming to help businesses “to guard against…

UAE Urges Android Users Of Samsung Vulnerabilities
03
Jul
2024

UAE Urges Android Users Of Samsung Vulnerabilities

In response to recent security vulnerabilities discovered in flagship Samsung models, the UAE Cyber Security Council has issued a critical…

Opaxe Data Breach
03
Jul
2024

Opaxe Data Breach Reportedly Exposes User Data Access

Opaxe Pty Ltd, an Australian software and information services company for mining and minerals industry, has allegedly suffered a cyberattack….

Alerts on Policy Breaches Now Available via API
03
Jul
2024

Alerts on Policy Breaches Now Available via API

All Surface Monitoring users can configure Attack Surface Policies directly from the new Domains page, enabling various combinations of characteristics…

Hackers Can Break Passkeys Using AitM Phishing Attacks
03
Jul
2024

Hackers Can Break Passkeys Using AitM Phishing Attacks

Hackers abuse phishing attacks as they are highly effective and low-cost methods for deceiving users into revealing sensitive information. Despite…

Juniper SRX Vulnerability Allows Attackers Trigger DoS Condition
03
Jul
2024

Juniper SRX Vulnerability Allows Attackers Trigger DoS Condition

A vulnerability in Junos OS on SRX Series devices allows attackers to trigger a DoS attack by sending crafted valid…

Open-Source Intelligence
03
Jul
2024

The Emerging Role of AI in Open-Source Intelligence

Jul 03, 2024The Hacker NewsOSINT / Artificial Intelligence Recently the Office of the Director of National Intelligence (ODNI) unveiled a…