Author: Cybernoz

Hackers Abuse Amazon & GitHub to Deploy Java-based Malware
14
Mar
2024

Hackers Abuse Amazon & GitHub to Deploy Java-based Malware

Hackers target these platforms due to their hosting of valuable resources and data. For financial gain or some other bad…

MobSF: Open-source security research platform for mobile apps
14
Mar
2024

MobSF: Open-source security research platform for mobile apps

The Mobile Security Framework (MobSF) is an open-source research platform for mobile application security, encompassing Android, iOS, and Windows Mobile….

Microsoft Flaw in Zero-Day Attack
14
Mar
2024

DarkGate Malware Exploits Recently Patched Microsoft Flaw in Zero-Day Attack

Mar 14, 2024NewsroomMalware / Cyber Attack A DarkGate malware campaign observed in mid-January 2024 leveraged a recently patched security flaw…

Roku Data Breach Exposes 15000 Accounts Amidst Policy Update
14
Mar
2024

Roku Data Breach Exposes 15000 Accounts Amidst Policy Update

Streaming service giant Roku recently experienced a data breach affecting over 15,000 user accounts.  Between December 28, 2023, and February…

Nissan contacting 100,000 A/NZ customers after December breach
14
Mar
2024

Nissan contacting 100,000 A/NZ customers after December breach – Security

Up to 100,000 Australian and New Zealand customers may have been affected by Nissan’s December cyber incident. The company first…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
14
Mar
2024

Announcing the HackerOne Brand Ambassadors

HackerOne Brand Ambassadors are leaders who have a passion to bring the community together in their local city or region….

Hackers simulating cyber-attacks in labs
14
Mar
2024

Immutable data storage is last line of defense against ransomware

Ransomware attacks continue to escalate annually, prompting security analysts to advocate for strategies to combat the proliferation of malware. One…

Only 13% of medical devices support endpoint protection agents
14
Mar
2024

Only 13% of medical devices support endpoint protection agents

63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices,…

Google's Gemini AI Vulnerability let Hackers Gain Control Over Users’ Queries
14
Mar
2024

Google’s Gemini AI Vulnerability let Hackers Gain Control Over Users’ Queries

Researchers discovered multiple vulnerabilities in Google’s Gemini Large Language Model (LLM) family, including Gemini Pro and Ultra, that allow attackers…

IT leaders think immutable data storage is an insurance policy against ransomware
14
Mar
2024

IT leaders think immutable data storage is an insurance policy against ransomware

IT leaders consider immutable storage as a must-have in the fight against cyberattacks, according to Scality. Ransomware threats are now…

Hackerone logo
14
Mar
2024

The World’s Largest Live Hacking Event

h1-2010 Live Hacking Video Recap Thu, 12/10/2020 – 18:43 Sam Spielman How can we make this one different?  For organizations…

IBM observability software patched against critical bugs
14
Mar
2024

IBM observability software patched against critical bugs – Security

IBM’s Instana Observability software needs patching against critical vulnerabilities in Node.js components. In an advisory, the vendor explained that CVE-2023-42282…