Author: Cybernoz

The XZ Backdoor: Everything You Need to Know
02
Apr
2024

The XZ Backdoor: Everything You Need to Know

On Friday, a lone Microsoft developer rocked the world when he revealed a backdoor had been intentionally planted in XZ…

xz-utils Backdoor Affects Kali Linux Installations
02
Apr
2024

xz-utils Backdoor Affects Kali Linux Installations

A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1, which harbors a backdoor capable of…

Incognito Mode Privacy Lawsuit
02
Apr
2024

Google to Delete Billions of Browsing Records in ‘Incognito Mode’ Privacy Lawsuit Settlement

Apr 02, 2024NewsroomBrowser Security / Data Security Google has agreed to purge billions of data records reflecting users’ browsing activities…

Phishing-as-a-Service Platform Launched 20,000 Phishing Domains
02
Apr
2024

Phishing-as-a-Service Platform Launched 20,000 Phishing Domains

The cybersecurity landscape faces a new threat with the emergence of ‘darcula,’ a Phishing-as-a-Service (PhaaS) platform. This sophisticated service enables…

upstream xz/liblzma
02
Apr
2024

Veracode Announces Acquisition of Longbow Security

Veracode, a leading provider in the cybersecurity space, has officially announced its acquisition of Longbow Security. This strategic move is…

CVE-2024-3094 Vulnerability
02
Apr
2024

XZ Utils Backdoor (CVE-2024-3094) Leads To SSH Compromise

A critical vulnerability has been discovered within the XZ Utils library (a command line tool for compressing and decompressing XZ…

CVE-2023-50969
02
Apr
2024

CVE-2023-50969 Vulnerability Threatens SecureSphere Users

A critical security flaw, identified as CVE-2023-50969, has recently been discovered in Imperva SecureSphere, a popular on-premise Web Application Firewall…

xz-utils Backdoor Affected Kali Linux Installations: Check for Infection
02
Apr
2024

xz-utils Backdoor Affected Kali Linux Installations: Check for Infection

A backdoor was recently discovered in the xz-utils package versions 5.6.0 to 5.6.1, shocking the Linux community. This poses a…

Venom RAT
02
Apr
2024

Venom RAT Targeting Multiple Sectors

Apr 02, 2024NewsroomMalvertising / Threat Intelligence The threat actor known as TA558 has been attributed to a new massive phishing…

02
Apr
2024

Securing the Future: Identity Takes Centre Stage in Business Operations – Partner Content

In the dynamic realm of digital business operations, identity security emerges as a vital element of organisational resilience. “Investing in…

Cloud Active Defense: Open-source cloud protection
02
Apr
2024

Cloud Active Defense: Open-source cloud protection

Cloud Active Defense is an open-source solution that integrates decoys into cloud infrastructure. It creates a dilemma for attackers: risk…

6 keys to navigating security and app development team tensions
02
Apr
2024

6 keys to navigating security and app development team tensions

There will always be a natural tension between cybersecurity teams and developers. After all, it’s the developer’s role to “develop.”…