Author: Cybernoz
Threat actors use malicious PyPI packages to infiltrate systems and execute various attacks like data exfiltration, ransomware deployment, or system…
Mar 13, 2024NewsroomLarge Language Model / AI Security Google’s Gemini large language model (LLM) is susceptible to security threats that…
A new information stealer has entered the dark web markets. Dubbed “Xehook Stealer,” this .NET-based malware, meticulously crafted to target…
Microsoft published its March 2024 Patch Tuesday, which addressed almost 59 vulnerabilities in its products and none of them were…
EquiLend, a financial technology firm, experienced a data breach following a January ransomware attack – EquiLend is offering credit monitoring…
Mar 13, 2024The Hacker NewsSaaS Security / Webinar Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS…
Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…
The Stanford University data breach involved a ransomware attack by the Akira ransomware gang. The breach occurred between May 12,…
Mar 13, 2024NewsroomPhishing Attack / Threat Intelligence A new phishing campaign has been observed delivering remote access trojans (RAT) such…
Legislation to exonerate hundreds of former subpostmasters of convictions based on evidence from the Post Office’s unreliable computer system begins…
Stanford University has recently disclosed a significant data breach affecting more than 27,000 individuals, stemming from a security incident within…
In the wake of the LockBit ransomware group’s takedown, a shift has occurred within the cybercriminal underworld, leading to a…











