Author: Cybernoz

Snowblind malware abuses Android security feature to bypass security
26
Jun
2024

Snowblind malware abuses Android security feature to bypass security

A novel Android attack vector from a piece of malware tracked as Snowblind is abusing a security feature to bypass…

Hackers Leveraging CHM Files To Attack Users With Password-Protected Zip Files
26
Jun
2024

Hackers Leveraging CHM Files To Attack Users With Password-Protected Zip Files

⁤Hackers abuse CHM files because they can embed malicious scripts or code within them. Windows systems often trust and execute…

P2Pinfect Redis Server with New Ransomware Payload
26
Jun
2024

P2Pinfect Redis Server with New Ransomware Payload

Cybersecurity researchers have identified a new ransomware payload associated with the P2Pinfect malware, primarily targeting Redis servers. This sophisticated malware,…

KillSec Announces New RaaS Program for Hackers
26
Jun
2024

KillSec Launches Advanced RaaS Program For Cybercriminals

Hacktivist group KillSec has revealed a new weapon in their digital arsenal: a Ransomware as a Service (RaaS) program designed…

FireTail Unveils Free Access for All to Cutting-Edge API Security PlatformFireTail Unveils Free Access for All to Cutting-Edge API Security Platform
26
Jun
2024

Ollama AI Platform Flaw Let Attackers Execute Remote Code

⁤Hackers attack AI infrastructure platforms since these systems contain a multitude of valuable data, algorithms that are sophisticated in nature,…

Is Your Organization a Laggard or a Leader in Digital Trust?
26
Jun
2024

Is Your Organization a Laggard or a Leader in Digital Trust?

By Mike Fleck, Head of Product Marketing at DigiCert Digital trust is at the core of what makes internet connected…

100 Facts, Figures, Predictions And Statistics
26
Jun
2024

100 Facts, Figures, Predictions And Statistics

26 Jun 2024 Cybersecurity Almanac: 100 Facts, Figures, Predictions And Statistics Posted at 08:52h in Blogs by Di Freeze This…

Malware peddlers experimenting with BPL sideloading and masking malicious payloads as PGP keys
26
Jun
2024

Malware peddlers experimenting with BPL sideloading and masking malicious payloads as PGP keys

A newly spotted campaign is leveraging BPL sideloading and other uncommon tricks to deliver the IDAT Loader (aka HijackLoader) malware…

AirPods Bluetooth Vulnerability
26
Jun
2024

Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping

Jun 26, 2024NewsroomFirmware Security / Vulnerability Apple has released a firmware update for AirPods that could allow a malicious actor…

BianLian Ransomware Attack
26
Jun
2024

Two US Firms Allegedly Targeted

Notorious ransomware group BianLian has claimed to have added two new organizations as its latest cyberattack victims. The BianLian ransomware…

Researchers Released PoC For Windows Bluetooth Service RCE Vulnerability
26
Jun
2024

Researchers Released PoC For Windows Bluetooth Service RCE Vulnerability

Microsoft addressed a Remote code execution vulnerability on their Bluetooth service on March 2023 Patch Tuesday. This vulnerability could allow…

Ollama AI Remote Code Execution Flaw
26
Jun
2024

OilRig Hackers Attacking Individuals And Organizations In The Middle East

OilRig is an Iranian-linked cyber espionage group that has been active since 2015, and this group is known for its…