Author: Cybernoz

Critical Jenkins Vulnerability Let Attackers Execute Remote Code
26
Jan
2024

Critical Jenkins Vulnerability Let Attackers Execute Remote Code

Jenkins is an open-source automation server that is based on Java used for continuous integration and continuous delivery processes. Threat…

Expect to Fail: How Organizations Can Benefit from a Breach
26
Jan
2024

Expect to Fail: How Organizations Can Benefit from a Breach

By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…

How to Create a Threat Hunting Program for Your Business
26
Jan
2024

How to Create a Threat Hunting Program for Your Business

By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s…

China-Linked Blackwood APT Deploys Advanced NSPX30 Backdoor in Cyberespionage
26
Jan
2024

China-Linked Blackwood APT Deploys Advanced NSPX30 Backdoor in Cyberespionage

The Blackwood APT is using the NSPX30 backdoor in cyberespionage attacks against individuals and companies in China, Japan, and the…

Defense-in-Depth
26
Jan
2024

Perfecting the Defense-in-Depth Strategy with Automation

Medieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward to the digital age, and…

Clop cyber gang claims MOVEit attack and starts harassing victims
26
Jan
2024

Akira ransomware gang claims Lush cyber attack

The Akira ransomware gang has claimed responsibility for a cyber attack on the systems of UK-headquartered cosmetics manufacturer and retailer…

Watch out, experts warn of a critical flaw in Jenkins
26
Jan
2024

Watch out, experts warn of a critical flaw in Jenkins

Watch out, experts warn of a critical flaw in Jenkins Pierluigi Paganini January 26, 2024 Jenkins maintainers addressed several security…

Unified Communications Flaw Let Attackers Execute Arbitrary Code
26
Jan
2024

Unified Communications Flaw Let Attackers Execute Arbitrary Code

Cisco Unified Communications and Contact Center Solutions, known for their robustness, have recently been under scrutiny due to a critical…

How To Improve Security Capacities of The Internet of Things?
26
Jan
2024

How To Improve Security Capacities of The Internet of Things?

By Milica D. Djekic The security of the Internet of Things (IoT) is one of the main challenges of today….

Webinar
26
Jan
2024

Chinese Hackers Hijack Software Updates to Install Malware

In order to obtain unauthorized access and control, hackers take advantage of software vulnerabilities by manipulating updates. By corrupting the…

Malicious Ads on Google
26
Jan
2024

Malicious Ads on Google Target Chinese Users with Fake Messaging Apps

Jan 26, 2024NewsroomMalvertising / Phishing-as-a-service Chinese-speaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram…

What secure coding practices mean to modern cyber security
26
Jan
2024

Security Think Tank: What to expect in cyber this year

“In like a lion, out like a lamb” is an accurate description of 2023. It was a challenging start to…