Author: Cybernoz
Discover how scammers employ QR codes and fake voicemails for credential harvesting, with over 1,000 attacks detected in the last…
While most organizations focus cybersecurity efforts on fortifying their networks, the mobile devices connected to them often remain vulnerable. In…
Canada Gov plans to ban the Flipper Zero to curb car thefts Pierluigi Paganini February 12, 2024 The Canadian government…
International humanitarian law prohibits attacks on hospitals and health care facilities, or against patients, doctors, and their means of transport,…
Feb 12, 2024NewsroomVulnerability / Data Recovery Cybersecurity researchers have uncovered an “implementation vulnerability” that has made it possible to reconstruct…
The geopolitical landscape is increasingly fractured, and corporations are being sucked into the vortex. Senior executives aren’t just facing down…
The notorious LockBit ransomware group has recently struck again, allegedly targeting a diverse range of entities and adding ten new…
At least 18 hospitals in Romania were knocked offline after a ransomware attack took down their healthcare management system. The…
Feb 12, 2024The Hacker NewsInfrastructure Security / Software Supply Chain The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that…
More than 1,000 subposmasters could have used the Post Office’s Capture software, as more details emerge about how they were…
The hacking group Dark Storm Team has issued a menacing ultimatum, vowing to unleash a wave of cyberattacks targeting the…
Files encrypted by Rhysida ransomware can be successfully decrypted, due to a implementation vulnerability discovered by Korean researchers and leveraged…











