Author: Cybernoz

Regional Investment Corporation insources loan management, contact centre
12
Feb
2024

Regional Investment Corporation insources loan management, contact centre – Finance – Cloud – Software

Regional Investment Corporation (RIC), a government lender to farm businesses, has completed a project to insource lending and contact centre…

US CISA added critical Apache RocketMQ flaw to its Known Exploited Vulnerabilities catalog
12
Feb
2024

CISA adds Roundcube Webmail Persistent XSS bug to its Known Exploited Vulnerabilities catalog

CISA adds Roundcube Webmail Persistent XSS bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 12, 2024 U.S. Cybersecurity…

CISA
12
Feb
2024

Roundcube email server bug now exploited in attacks

CISA warns that a Roundcube email server vulnerability patched in September is now actively exploited in cross-site scripting (XSS) attacks….

Ransomware Attack Disrupts Services in 18 Romanian Hospitals
12
Feb
2024

Ransomware Attack Disrupts Services in 18 Romanian Hospitals

The Romanian Ministry of Health has confirmed that its critical system is down due to the ransomware attack, and authorities…

Who Pays For Cybercrime Damages? IBM Says It's The Consumers.
12
Feb
2024

Cybersecurity Red Flags. Guarding Your Heart (And Data) This Valentine’s Day.

Valentine’s Day isn’t only for lovebirds. Fullstack Academy warns that in the digital age, where people often convey gestures of love…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
12
Feb
2024

If only you had to worry about malware, with Jason Haddix: Lock and Code S05E04

Today on the Lock and Code podcast… If your IT and security teams think malware is bad, wait until they…

Ivanti
12
Feb
2024

Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor

Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy…

Warzone RAT
12
Feb
2024

3 Well-known Microsoft Word & Excel Flaws Exploited

Despite not being 0-day or even 1-day vulnerabilities, three well-known and outdated CVEs in Microsoft Word and Excel continue to pose…

Who Pays For Cybercrime Damages? IBM Says It's The Consumers.
12
Feb
2024

Australian Woman Loses $154K To An Elaborate Phishing Scheme

A mum of three opened up to DailyMail Australia a couple of years about how she was scammed out of $154,000 as…

Key Unlock
12
Feb
2024

Free Rhysida ransomware decryptor for Windows exploits RNG flaw

South Korean researchers have publicly disclosed an encryption flaw in the Rhysida ransomware encryptor, allowing the creation of a Windows…

Beware-Raspberry Robin That Delivered as a Windows Component
12
Feb
2024

Beware-Raspberry Robin That Delivered as a Windows Component

Raspberry Robin is a malicious worm that spreads through USB drives, and it’s been actively used by the threat actors…

Warzone RAT
12
Feb
2024

Huge Surge in Hackers Exploiting QR code for Phishing Attacks

Phishing has been one of the primary methods threat actors use for impersonating individuals or brands with a sense of…