Author: Cybernoz

Chinese Hackers
31
Jan
2024

Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

Jan 31, 2024NewsroomCyber Attack / Network Security A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual…

R00TK1T ISC Claims Cybersecurity Incident
31
Jan
2024

R00TK1T ISC Claims Cybersecurity Incident

The pro-Israeli hacktivist group, R00TK1T ISC Cyber Team, has allegedly targeted Malaysian entities, marking their first cyberattack on Aminia.  The…

Snatch Ransomware Group Claims The FDVA Cyber Attack
31
Jan
2024

NoName Cyberattack Hits Dutch Organizations

The NoName group claims to have launched a sophisticated cyberattack on multiple high-profile websites in the Netherlands. The targeted organizations…

Webinar
31
Jan
2024

45K+ Publicly Exposed Jenkins Instances Vulnerable to RCE Attacks

It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file…

Australian companies breach no ransomware payment policy
31
Jan
2024

Australian companies breach no ransomware payment policy

In response to the surge in ransomware attacks over the last couple of years, the Australian government introduced legislation in…

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management
31
Jan
2024

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of…

Linux Hacking
31
Jan
2024

New Glibc Flaw Grants Attackers Root Access on Major Linux Distros

Jan 31, 2024NewsroomVulnerability / Endpoint Security Malicious local attackers can obtain full root access on Linux machines by taking advantage…

Facebook and Instagram collect immense data from users
31
Jan
2024

Precision in Action: A Guide to Handling Cybersecurity Incidents

In an era dominated by digital connectivity, the importance of robust cybersecurity cannot be overstated. As organizations navigate the complex…

Does CVSS 4.0 solve the exploitability problem?
31
Jan
2024

Does CVSS 4.0 solve the exploitability problem?

The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released…

Cybercriminals replace familiar tactics to exfiltrate sensitive data
31
Jan
2024

Cybercriminals replace familiar tactics to exfiltrate sensitive data

Ransomware attacks are increasing again as cybercriminals’ motivation shifts to data exfiltration, according to Delinea. The familiar tactics of crippling…

Database management enters a new era of complexity
31
Jan
2024

Database management enters a new era of complexity

Increasing complexity, the rapid adoption of emerging technologies and a growing skills gap are the biggest concerns facing IT leaders…

Seek stands up a security data lake
31
Jan
2024

Seek stands up a security data lake – Cloud – Security

Seek has stood up a cloud-based security data lake, initially to improve its incident response but with a view to…