Author: Cybernoz
Feb 08, 2024NewsroomData Protection / Mobile Securit Google has unveiled a new pilot program in Singapore that aims to prevent…
By Neelesh Kripalani, Chief Technology Officer, Clover Infotech We live in this hyper-connected world, where our lives are intricately woven…
UN sanctions monitors are delving into a series of suspected cyberattacks by North Korea, allegedly amassing a staggering $3 billion…
Cisco fixes critical Expressway Series CSRF vulnerabilities Pierluigi Paganini February 08, 2024 CISCO fixed two critical flaws in Expressway Series…
Mike Eaton | 08 February 2024 at 09:05 UTC Earlier this year, we released BChecks, a powerful yet simple scripting…
Spyware is a crucial tool for the surveillance and data collection of high-risk individuals. The functionalities of spyware have undergone…
If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure…
Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at…
SOAPHound is an open-source data collection tool capable of enumerating Active Directory environments through the Active Directory Web Services (ADWS)…
Feb 08, 2024NewsroomCyber Espionage / Malware The North Korea-linked nation-state actor known as Kimsuky is suspected of using a previously…
The BlackSuit ransomware group has struck again, adding two new victims to its ever-growing list of targets. This time, the…
Six US government agencies have joined three international partners to warn that attackers from the Volt Typhoon threat group are…










