Author: Cybernoz

Pro-Russia group hit Swiss govt sites after Zelensky visit in Davos
18
Jan
2024

Pro-Russia group hit Swiss govt sites after Zelensky visit in Davos

Pro-Russia group hit Swiss govt sites after Zelensky visit in Davos Pierluigi Paganini January 17, 2024 Switzerland believes that the…

Hacker data center
17
Jan
2024

Iranian hackers target researchers with new MediaPl malware

Microsoft says that a group of Iranian-backed state hackers are targeting high-profile employees of research organizations and universities across Europe…

Kaspersky's iShutdown Tool Detects Pegasus Spyware on iOS Devices
17
Jan
2024

Kaspersky’s iShutdown Tool Detects Pegasus Spyware on iOS Devices

The iShutdown tool has been launched a few weeks after Kaspersky cybersecurity researchers revealed significant insights into Operation Triangulation. This…

Pegasus on Your iPhone
17
Jan
2024

New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone

Jan 17, 2024NewsroomSpyware / Forensic Analysis Cybersecurity researchers have identified a “lightweight method” called iShutdown for reliably identifying signs of…

NCSC invites security pros to join the big leagues
17
Jan
2024

NCSC invites security pros to join the big leagues

The UK’s National Cyber Security Centre (NCSC) has launched Cyber League, an initiative through which it hopes to bring together…

TV bot
17
Jan
2024

Bigpanzi botnet infects 170,000 Android TV boxes with malware

A previously unknown cybercrime syndicate named ‘Bigpanzi’ has been making significant money by infecting Android TV and eCos set-top boxes…

Keeper Security Adds Support for Hardware Security Keys as Sole 2FA Method
17
Jan
2024

Keeper Security Adds Support for Hardware Security Keys as Sole 2FA Method

Zero-trust and zero-knowledge pros, Keeper Security, have introduced support for hardware security keys as a single Two-Factor Authentication (2FA) method….

Google's Incognito: Shrouded in Secrecy, Now Slightly Less So
17
Jan
2024

New Disclaimer Reveals Data Tracking

Google’s New Disclaimer Confuses Users with Data Collection Admission – It All Happened After the Company Had to Face a…

Wing Security unveils automated protection against AI-SaaS risks
17
Jan
2024

Wing Security unveils automated protection against AI-SaaS risks

Wing Security unveils an automatic advanced approach to counter the evolving risks of Intellectual Property (IP) and data leakage into…

Free Discovery And Risk Reduction Automation
17
Jan
2024

Combating IP Leaks into AI Applications with Free Discovery and Risk Reduction Automation

Wing Security announced today that it now offers free discovery and a paid tier for automated control over thousands of…

Finnish IT industry talent fears amid government restrictions
17
Jan
2024

Helsinki: The trailblazing smart city

A collection of startup incubators, sustainable initiatives, supporting testbeds and novel innovations confirm Finland’s capital as a global innovation and…

Wazuh header
17
Jan
2024

Building robust cybersecurity architecture with open source tools

Cybersecurity architecture refers to the design and structure of an organization’s approach to securing its information systems. It outlines the…