Author: Cybernoz
Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a…
Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called “everything,” and others named a…
On Wednesday, the London Public Library stated that certain workers’ personal information was stolen by the hackers responsible for the…
Jan 04, 2024NewsroomSoftware Security / Malware The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT…
Wireshark is a popular open-source network protocol analyzer that allows users to inspect and capture data on a network in…
The Kershaw County School District, a prominent educational institution in the USA, has allegedly fallen victim to a cyberattack by…
A threat actor named “xc7d2f4” is allegedly selling remote command injection vulnerability for Cisco ASA. The threat actor has claimed…
Jan 04, 2024NewsroomCryptocurrency / Social Media American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account…
A threat actor has come forward claiming to have leaked a database and executed SQL injection for the H. Congress…
The Twitter account of Mandiant, a prominent American cybersecurity firm and Google subsidiary, fell victim to a security breach earlier…
DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and…
Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency…









