Author: Cybernoz
In recent times, we’ve been inundated with countless stories about ransomware attacks and the extortion demands posed by cyber-criminals. However,…
Which are the top storage array makers and what are their strategies towards the cloud, containers and consumption models of…
Ransomware attackers exploit Windows zero-day vulnerabilities to gain elevated privileges. Zero-day vulnerabilities are undisclosed flaws that provide a direct way…
Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating…
By the beginning of 2023, the biggest storage supplier (Dell EMC) had seen growth in market share, while a giant…
I recently hosted and moderated a distinguished panel of Chief Information Security Officers (CISOs) – Nitin Raina, CISO at ThoughtWorks,…
Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841 Pierluigi Paganini December 27, 2023 Security firm Barracuda addressed…
GitHub, the omnipresent nexus for developers and their code, has embarked on a decisive initiative aimed at fortifying the security…
Hackers use weaponized Word documents to deliver malicious payloads through social engineering. By embedding malware or exploiting vulnerabilities in these…
When it comes to cyber crime, it’s easy to assume that there is nothing new under the sun. After all,…
The Snatch ransomware group has claimed the US President data leak, listing alleged Personally Identifiable Information (PII) and leaked data…
The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections….











