Author: Cybernoz
Oleksandr Kryvtsov had enough. The owner of an agricultural company in Hrakove, near Kharkiv, Kryvtsov found his land littered with…
A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept…
Protecting against credential stuffing attacks requires a multi-layered approach to security. Here are some effective strategies to defend against such…
When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known…
Feb 19, 2024NewsroomCyber Espionage / Vulnerability Threat actors operating with interests aligned to Belarus and Russia have been linked to…
ETISALAT, the state-owned Emirates Telecommunications Group Company PJSC in the UAE, is reportedly grappling with a ransomware assault attributed to…
SolarWinds has patched five remote code execution (RCE) vulnerabilities in its Access Rights Manager software, three of which are rated…
We had a great conversation during February’s UL Mid-month Meetup, where we discussed our careers, how vulnerable they were to…
70% of businesses report that fraud losses have increased in recent years and over half of consumers feel they’re more…
Feb 19, 2024NewsroomMalware / Cyber Espionage The Iranian-origin threat actor known as Charming Kitten has been linked to a new…
A 15-hour outage of parliamentarians’ expense system in January has been attributed to an unpaid invoice. The cause of the…
Property developers could be required to consider mobile coverage during planning of housing developments larger than 50 dwellings. The federal…











