Author: Cybernoz

Active Directory Infiltration Methods Employed by Cybercriminals
04
Jan
2024

Active Directory Infiltration Methods Employed by Cybercriminals

Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a…

npm
04
Jan
2024

‘everything’ blocks devs from removing their own npm packages

Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called “everything,” and others named a…

Snatch Ransomware Group Claims The FDVA Cyber Attack
04
Jan
2024

Staff Data Exposed In Cyberattack On London Public Library

On Wednesday, the London Public Library stated that certain workers’ personal information was stolen by the hackers responsible for the…

Remcos RAT
04
Jan
2024

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT

Jan 04, 2024NewsroomSoftware Security / Malware The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT…

Wireshark 4.2.1 Released - What's New!
04
Jan
2024

Wireshark 4.2.1 Released – What’s New!

Wireshark is a popular open-source network protocol analyzer that allows users to inspect and capture data on a network in…

Snatch Ransomware Group Claims The FDVA Cyber Attack
04
Jan
2024

Kershaw County School Hit By Black Suit Ransomware

The Kershaw County School District, a prominent educational institution in the USA, has allegedly fallen victim to a cyberattack by…

Snatch Ransomware Group Claims The FDVA Cyber Attack
04
Jan
2024

Remote Command Injection Vulnerability For Sale On Dark Web

A threat actor named “xc7d2f4” is allegedly selling remote command injection vulnerability for Cisco ASA. The threat actor has claimed…

Mandiant
04
Jan
2024

Mandiant’s Twitter Account Restored After Six-Hour Crypto Scam Hack

Jan 04, 2024NewsroomCryptocurrency / Social Media American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account…

H. Congress of the State of Colima in Mexico
04
Jan
2024

Hackers Claim H. Congress Of The State Of Colima Data Breach

A threat actor has come forward claiming to have leaked a database and executed SQL injection for the H. Congress…

Mandiant Security Breach
04
Jan
2024

Mandiant Security Breach: Twitter Account Compromised

The Twitter account of Mandiant, a prominent American cybersecurity firm and Google subsidiary, fell victim to a security breach earlier…

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream's disk forensic artifacts
04
Jan
2024

DriveFS Sleuth: Open-source tool for investigating Google Drive File Stream’s disk forensic artifacts

DriveFS Sleuth automates the investigation of Google Drive File Stream disk artifacts. The tool can parse the disk artifacts and…

15 open-source cybersecurity tools you'll wish you'd known earlier
04
Jan
2024

15 open-source cybersecurity tools you’ll wish you’d known earlier

Open-source tools represent a dynamic force in the technological landscape, embodying innovation, collaboration, and accessibility. These tools, developed with transparency…