Author: Cybernoz

Brave
22
Jan
2024

Brave to end ‘Strict’ fingerprinting protection as it breaks websites

Brave Software has announced plans to deprecate the ‘Strict’ fingerprinting protection mode in its privacy-focused Brave Browser because it causes…

Facebook
22
Jan
2024

Watch out for “I can’t believe he is gone” Facebook phishing posts

A widespread Facebook phishing campaign stating, “I can’t believe he is gone. I’m gonna miss him so much,” leads unsuspecting…

Evolution of AI Assistants: Navigating Breakthroughs in Software Development
22
Jan
2024

Navigating Breakthroughs in Software Development

We are now at the age of advanced AI assistants. This unique software significantly simplifies our everyday tasks, providing us…

NSW trials AI to predict risks to children in state care
22
Jan
2024

NSW trials AI to predict risks to children in state care – Software

The NSW government is testing the ability of an artificial intelligence model to predict risks to children and young people…

LockBit gang claims the attack on the sandwich chain Subway
22
Jan
2024

LockBit gang claims the attack on the sandwich chain Subway

LockBit ransomware gang claims the attack on the sandwich chain Subway Pierluigi Paganini January 21, 2024 The LockBit ransomware gang…

Tietoevry datacenter
21
Jan
2024

Tietoevry ransomware attack causes outages for Swedish firms, cities

Finnish IT services and enterprise cloud hosting provider Tietoevry has suffered a ransomware attack impacting cloud hosting customers in one…

Qantas embraces Polylith in part of its software engineering
21
Jan
2024

Qantas embraces Polylith in part of its software engineering – Software

Qantas is making use of the open source Polylith software architecture and tooling to make it simpler and less resource-intensive…

Snatch Ransomware Group Claims The FDVA Cyber Attack
21
Jan
2024

Fortify Your Systems With An Effective API Security Strategy

By Anastasios Arampatzis, Cybersecurity Content Creator at Bora  In today’s digital age, APIs have become the backbone of software communication….

Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed
21
Jan
2024

Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Key elements for a successful…

Webinar: Join us for the latest in API Threats on January 24, 2024
21
Jan
2024

Webinar: Join us for the latest in API Threats on January 24, 2024

In today’s complex digital landscape, the security of APIs has become paramount. As we move into 2024, it’s essential to…

Webinar
21
Jan
2024

New Outlook Flaw Let Attackers Access Hashed Passwords

A new Outlook vulnerability that can be used to extract NTLMv2 hashes by exploiting Outlook, Windows Performance Analyzer (WPA), and…

Bluetooth Flaw Let Hackers Takeover of iOS & Android Devices
21
Jan
2024

Bluetooth Flaw Let Hackers Takeover of iOS & Android Devices

Bluetooth vulnerabilities in Android, Linux, macOS, iOS, and Windows are critical as hackers could exploit them to gain unauthorized access…