Author: Cybernoz
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For continuous coverage, we push…
RTM Locker is the latest enterprise-targeting ransomware operation found to be deploying a Linux encryptor that targets virtual machines on…
Every day, countless people across all industries send and receive emails as a significant part of their jobs. Email is…
Intel gave permission to Google to hack its servers operating on its new security hardware product dubbed “Trust Domain Extensions”…
Microsoft has addressed a known issue affecting Outlook for Microsoft 365 customers that prevented them from accessing group mailboxes and…
The Ukranian Cyber police officers tracked down the 36-year-old resident of Netishyn as he was selling the personal data of…
The security community is being invited to explore the potential of generative artificial intelligence (AI) to act as a useful…
What Is a Vulnerability Disclosure Program? A VDP is a structured method for anyone to report vulnerabilities. VDPs should include…
Modern IT system administrators know the importance of maintaining a strong password policy. In this article, we’ll explore the evolution…
Mirai botnet exploits CVE-2023-1389 to add TP-Link Archer A21 (AX1800) routers to DDoS attacks. During the Pwn2Own Toronto event in…
Weeks after launching its new leak site, the Akira ransomware group has listed three victims: American engineering consultancy business 4LEAF,…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For continuous coverage, we push out major Detectify security updates…