Author: Cybernoz

What secure coding practices mean to modern cyber security
27
Dec
2023

Zero-trust principles: Your gateway to securing remote workers

The concept of working ‘on any device from anywhere’ is not new, but the Covid-19 pandemic brought the security challenges…

What secure coding practices mean to modern cyber security
27
Dec
2023

Beyond the office walls: Safeguarding remote workers from attack

As we all know, the flexibility and convenience to work from anywhere has been welcomed by us over the past…

Apache OfBiz ERP
27
Dec
2023

Critical Zero-Day in Apache OfBiz ERP System Exposes Businesses to Attack

Dec 27, 2023NewsroomZero-Day / Vulnerability A new zero-day security flaw has been discovered in the Apache OfBiz, an open-source Enterprise…

Post Office gets government handout as Horizon replacement costs increase ‘significantly’
27
Dec
2023

Post Office gets government handout as Horizon replacement costs increase ‘significantly’

Increasing costs and a lengthening timeline have forced the government to hand the Post Office an extra £103m towards its…

Android malware
27
Dec
2023

New Xamalicious Android malware installed 330k times on Google Play

A previously unknown Android backdoor named ‘Xamalicious’ has infected approximately 338,300 devices via malicious apps on Google Play, Android’s official…

Nim-Based Malware Word Document
27
Dec
2023

Hackers Stolen Over $58 Million Crypto Via Malicious Google Ads

Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been…

Ransomware attack leads to identity theft of an Oakland Man
27
Dec
2023

Ransomware attack leads to identity theft of an Oakland Man

In recent times, we’ve been inundated with countless stories about ransomware attacks and the extortion demands posed by cyber-criminals. However,…

Kao Data unveils Tier II datacentre strategy by pledging to open Manchester facility in late 2025
27
Dec
2023

Storage suppliers’ market share and strategy 2023

Which are the top storage array makers and what are their strategies towards the cloud, containers and consumption models of…

Ransomware Attackers Exploit Windows Zero-day Exploits
27
Dec
2023

Ransomware Attackers Exploit Windows Zero-day Exploits

Ransomware attackers exploit Windows zero-day vulnerabilities to gain elevated privileges. Zero-day vulnerabilities are undisclosed flaws that provide a direct way…

Malicious Google and X Ads
27
Dec
2023

Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating…

Top 10 storage supplier strategy stories of 2023
27
Dec
2023

Top 10 storage supplier strategy stories of 2023

By the beginning of 2023, the biggest storage supplier (Dell EMC) had seen growth in market share, while a giant…

Top 10 Trends for 2024
27
Dec
2023

Top 10 Trends for 2024

I recently hosted and moderated a distinguished panel of Chief Information Security Officers (CISOs) –  Nitin Raina, CISO at ThoughtWorks,…