Author: Cybernoz

Ransomware attack leads to identity theft of an Oakland Man
27
Dec
2023

Ransomware attack leads to identity theft of an Oakland Man

In recent times, we’ve been inundated with countless stories about ransomware attacks and the extortion demands posed by cyber-criminals. However,…

Kao Data unveils Tier II datacentre strategy by pledging to open Manchester facility in late 2025
27
Dec
2023

Storage suppliers’ market share and strategy 2023

Which are the top storage array makers and what are their strategies towards the cloud, containers and consumption models of…

Ransomware Attackers Exploit Windows Zero-day Exploits
27
Dec
2023

Ransomware Attackers Exploit Windows Zero-day Exploits

Ransomware attackers exploit Windows zero-day vulnerabilities to gain elevated privileges. Zero-day vulnerabilities are undisclosed flaws that provide a direct way…

Malicious Google and X Ads
27
Dec
2023

Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating…

Top 10 storage supplier strategy stories of 2023
27
Dec
2023

Top 10 storage supplier strategy stories of 2023

By the beginning of 2023, the biggest storage supplier (Dell EMC) had seen growth in market share, while a giant…

Top 10 Trends for 2024
27
Dec
2023

Top 10 Trends for 2024

I recently hosted and moderated a distinguished panel of Chief Information Security Officers (CISOs) –  Nitin Raina, CISO at ThoughtWorks,…

Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841
27
Dec
2023

Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841

Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841 Pierluigi Paganini December 27, 2023 Security firm Barracuda addressed…

GitHub Wants All Users to Enable 2FA Before the End of 2023
27
Dec
2023

GitHub Wants All Users to Enable 2FA Before the End of 2023

GitHub, the omnipresent nexus for developers and their code, has embarked on a decisive initiative aimed at fortifying the security…

Android Malware Actively Infecting Devices
27
Dec
2023

Nim-Based Malware Delivered via Weaponized Word Document

Hackers use weaponized Word documents to deliver malicious payloads through social engineering.  By embedding malware or exploiting vulnerabilities in these…

Lloyds Bank calls on tech companies to control social media ‘wild west’
27
Dec
2023

Top 10 cyber crime stories of 2023

When it comes to cyber crime, it’s easy to assume that there is nothing new under the sun. After all,…

US President Data Leak
27
Dec
2023

US President Data Leak: Snatch’s Claims Spark Speculation

The Snatch ransomware group has claimed the US President data leak, listing alleged Personally Identifiable Information (PII) and leaked data…

Apple
27
Dec
2023

iPhone Triangulation attack abused undocumented hardware feature

The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections….