Author: Cybernoz

Android Apps
08
Feb
2024

Google Starts Blocking Sideloading of Potentially Dangerous Android Apps in Singapore

Feb 08, 2024NewsroomData Protection / Mobile Securit Google has unveiled a new pilot program in Singapore that aims to prevent…

Tips To Secure Information In The Digital Age
08
Feb
2024

Tips To Secure Information In The Digital Age

By Neelesh Kripalani, Chief Technology Officer, Clover Infotech We live in this hyper-connected world, where our lives are intricately woven…

Snatch Ransomware Group Claims The FDVA Cyber Attack
08
Feb
2024

Cyberattacks By North Korea Yield $3 Bn For Nuclear Weapons

UN sanctions monitors are delving into a series of suspected cyberattacks by North Korea, allegedly amassing a staggering $3 billion…

Zero-day in Cisco ASA and FTD is actively exploited in ransomware attacks
08
Feb
2024

Cisco fixes critical Expressway Series CSRF vulnerabilities

Cisco fixes critical Expressway Series CSRF vulnerabilities Pierluigi Paganini February 08, 2024 CISCO fixed two critical flaws in Expressway Series…

What's new with BChecks? | Blog
08
Feb
2024

What’s new with BChecks? | Blog

Mike Eaton | 08 February 2024 at 09:05 UTC Earlier this year, we released BChecks, a powerful yet simple scripting…

Spyware Vendors Behind 50% 0-day Exploits: Google Said
08
Feb
2024

Spyware Vendors Behind 50% 0-day Exploits: Google Said

Spyware is a crucial tool for the surveillance and data collection of high-risk individuals. The functionalities of spyware have undergone…

Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game
08
Feb
2024

Prevention Strategies Inevitably Become a Constant Cat-and-Mouse Game

If you’re like me, you are hearing a lot right now about cyber resiliency, the need to protect critical infrastructure…

AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users
08
Feb
2024

AI-Enhanced Identity Fraud: A Mounting Threat to Organizations and Users

Identifying the most common AI-enhanced cyber-attack methods and strategies to mitigate them By Philipp Pointner, Chief of Digital Identity at…

SOAPHound: Open-source tool to collect Active Directory data via ADWS
08
Feb
2024

SOAPHound: Open-source tool to collect Active Directory data via ADWS

SOAPHound is an open-source data collection tool capable of enumerating Active Directory environments through the Active Directory Web Services (ADWS)…

Golang Stealer
08
Feb
2024

Kimsuky’s New Golang Stealer ‘Troll’ and ‘GoBear’ Backdoor Target South Korea

Feb 08, 2024NewsroomCyber Espionage / Malware The North Korea-linked nation-state actor known as Kimsuky is suspected of using a previously…

Snatch Ransomware Group Claims The FDVA Cyber Attack
08
Feb
2024

Two More Businesses Fall Victim

The BlackSuit ransomware group has struck again, adding two new victims to its ever-growing list of targets. This time, the…

Chinese attackers camped on US networks for five years
08
Feb
2024

Chinese attackers camped on US networks for five years – Strategy – Security

Six US government agencies have joined three international partners to warn that attackers from the Volt Typhoon threat group are…