Author: Cybernoz
GitLab has announced the release of updated versions for its Community Edition (CE) and Enterprise Edition (EE) platforms. These updates…
International Women’s Day has long been an advocate for elevating and advancing gender equality within the technology industry. At the…
Cisco has fixed two high-severity vulnerabilities affecting its Cisco Secure Client enterprise VPN and endpoint security solution, one of which…
The Coper malware, a descendant of the Exobot malware family, was first distributed as a fake version of Bancolombia’s ‘Personas’…
By Jasmine Harrison PC.dp, Account Manager – Data Protection People Women play an important role in the field of data…
Evasive Panda dubbed BRONZE HIGHLAND and Daggerfly, a Chinese-speaking APT group operating since at least 2012, has been spotted conducting cyberespionage…
CrowdStrike announced its acquisition of Flow Security, the industry’s first cloud-native data runtime security solution. This move positions CrowdStrike as…
Threat actors target email addresses, as they provide a way to access personal and confidential information. Emails often hold valuable…
Mar 08, 2024NewsroomEndpoint Security / Network Security Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling…
In the fast-paced world of cybersecurity, diversity isn’t just a buzzword; it’s a necessity for success. Yet, the door to…
Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration. Pierluigi Paganini March 08,…
The end-of-life for Talos rules support for two versions of the widespread intrusion detection and prevention system Snort has been…











