Author: Cybernoz

DNS Tunnel Keylogger - Post Exploitation Pentesting Tool
01
Apr
2024

DNS Tunnel Keylogger – Post Exploitation Pentesting Tool

A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to…

Infosec products of the month: March 2024
01
Apr
2024

Infosec products of the month: March 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, AuditBoard, Bedrock Security, Cado…

Android Banking Trojan
01
Apr
2024

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection…

AT&T Faces Massive Data Breach, Impacting 73 Million Accounts
01
Apr
2024

Cybersecurity Alert For 73M Accounts

Telecommunications giant AT&T has confirmed a data breach affecting 73 million accounts. The company’s official press release confirms the AT&T…

Millions of Customers Data Exposed
01
Apr
2024

Millions of Customers Data Exposed

AT&T has confirmed that personal data from approximately 73 million current and former customers has been leaked on the dark…

A Ghost Ship’s Doomed Journey Through the Gate of Tears
01
Apr
2024

A Ghost Ship’s Doomed Journey Through the Gate of Tears

The ballistic missile hit the Rubymar on the evening of February 18. For months, the cargo ship had been shuttling…

Escalating malware tactics drive global cybercrime epidemic
01
Apr
2024

Escalating malware tactics drive global cybercrime epidemic

Evasive, basic, and encrypted malware all increased in Q4 2023, fueling a rise in total malware, according to WatchGuard. Threat…

Adaptive Cybersecurity Strategies For Dynamic Threats
01
Apr
2024

Adaptive Cybersecurity Strategies For Dynamic Threats

By Mr. Zakir Hussain, CEO – BD Software Distribution As digital landscapes morph and expand, cybersecurity challenges intensify. The fusion…

Hackers Attack macOS Using Infostealer To Steal Sensitive Data
01
Apr
2024

Hackers Attack macOS Using Infostealer To Steal Sensitive Data

Over the past year, macOS users, particularly those in the cryptocurrency sector, have been increasingly targeted by infostealers. These malicious…

Compromised SaaS Supply Chain Apps
01
Apr
2024

DinodasRAT Linux Malware Attack on Linux Servers

DinodasRAT, also known as XDealer, is a sophisticated C++ backdoor targeting multiple operating systems. It is designed to enable attackers…

How to design and deliver an effective cybersecurity exercise
01
Apr
2024

How to design and deliver an effective cybersecurity exercise

Armed forces have always utilized war-gaming exercises for battlefield training to prepare for times of conflict. With today’s digital transformation,…

Hackers Attack Python Developers by Poising With Typosquat on PyPI
01
Apr
2024

Hackers Attack Python Developers by Poising With Typosquat on PyPI

An automated risk detection system identified a typosquatting campaign targeting popular Python libraries on PyPI. In two waves with a…