Author: Cybernoz

AI-Powered File Identification Tool
17
Feb
2024

Google Open Sources Magika: AI-Powered File Identification Tool

Feb 17, 2024NewsroomArtificial Intelligence / Data Protection Google has announced that it’s open-sourcing Magika, an artificial intelligence (AI)-powered tool to…

Hacker
17
Feb
2024

ALPHV ransomware claims loanDepot, Prudential Financial breaches

The ALPHV/Blackcat ransomware gang has claimed responsibility for the recent network breaches of Fortune 500 company Prudential Financial and mortgage…

SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles
17
Feb
2024

SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles

Two prototype satellites for the Missile Defense Agency and four missile-tracking satellites for the US Space Force rode a SpaceX…

Wyze
17
Feb
2024

Wyze investigating ‘security issue’ amid ongoing outage

Wyze Labs is investigating a security issue while experiencing a service outage that has been causing connectivity issues since this…

Leak of Russian ‘Threat’ Part of a Bid to Kill US Surveillance Reform, Sources Say
17
Feb
2024

Leak of Russian ‘Threat’ Part of a Bid to Kill US Surveillance Reform, Sources Say

While redirecting blame away from Turner and his cohorts, the claim is both false and deceptive, relying on assertions that,…

US CISA added critical Apache RocketMQ flaw to its Known Exploited Vulnerabilities catalog
16
Feb
2024

CISA adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog

CISA adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 16,…

FBI claims to have dismantled AlphV/Blackcat ransomware operation, but the group denies it
16
Feb
2024

US gov offers a reward of up to $10M for info on ALPHV/Blackcat gang leaders

US gov offers a reward of up to $10M for info on ALPHV/Blackcat gang leaders Pierluigi Paganini February 16, 2024 The…

SolarWinds
16
Feb
2024

SolarWinds fixes critical RCE bugs in access rights audit solution

SolarWinds has patched five remote code execution (RCE) flaws in its Access Rights Manager (ARM) solution, including three critical severity…

How to Interpret the MITRE Engenuity ATT&CK® Evaluations
16
Feb
2024

How to Interpret the MITRE Engenuity ATT&CK® Evaluations

Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…

SpyNote Android Spyware Poses as Legit Crypto Wallets, Steals Funds
16
Feb
2024

SpyNote Android Spyware Poses as Legit Crypto Wallets, Steals Funds

The notorious SpyNote Android spyware returns, exploiting Accessibility APIs to target crypto wallets and unsuspecting users, ultimately stealing their cryptocurrency….

GoldPickaxe steals your coin
16
Feb
2024

GoldPickaxe Trojan steals your face!

Well, the GoldPickaxe Trojan does not literally steal your face, but it does steal an image of your face in…

Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability
16
Feb
2024

Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability

Feb 16, 2024NewsroomRansomware / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched security flaw…