Author: Cybernoz

How Altcoins Influence The World of Crypto
23
Nov
2023

How Altcoins Influence The World of Crypto

Altcoins, or alternative cryptocurrencies, diversify the crypto landscape, offering investors options beyond Bitcoin and influencing market dynamics. Their innovation and…

US DoJ seized domains used by North Korean IT workers to defraud businesses worldwide
23
Nov
2023

North Korea-linked APT Diamond Sleet supply chain attack relies on CyberLink software

North Korea-linked APT Diamond Sleet supply chain attack relies on CyberLink software Pierluigi Paganini November 23, 2023 North Korea-linked APT…

ClearFake a New Malware Attacking Mac users via fake updates
23
Nov
2023

ClearFake a New Malware Attacking Mac users via fake updates

Mac users were targeted by a fake browser update chain called ‘ClearFake’, which was delivered by Atomic Stealer to compromise…

Hackers using Weaponized Office Doc to Exploit Windows RCE
23
Nov
2023

Hackers using Weaponized Office Doc to Exploit Windows RCE

A new attack chain campaign has been discovered, which involves the exploitation of CVE-2023-36884 and CVE-2023-36584. CVE-2023-36884 was a remote…

Cyber Mindfulness Corner Company Spotlight: Pentest People
23
Nov
2023

Cyber Mindfulness Corner Company Spotlight: Pentest People

At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week,…

It's Time to Log Off
23
Nov
2023

It’s Time to Log Off

“When we’re doomscrolling, we’re kind of looking for the resolution to the issue. Read some more posts. Read some more…

How social media scams are draining bank accounts of victims
23
Nov
2023

FBI and CISA warn against Scattered Spider triggered cyber attacks

Law enforcement agencies in North America have issued a warning regarding the Scattered Spider cyber-attacks, citing their adoption of aggressive…

Navigating the DPDI Bill: A transformative shift ahead
23
Nov
2023

Navigating the DPDI Bill: A transformative shift ahead

The Data Protection and Digital Information (No. 2) Bill, or DPDI, is set to reshape the UK’s data protection framework….

Australian Cyber Security Strategy 2023
23
Nov
2023

Australian Cyber Security Strategy 2023: Fortifying Digital Defenses

The new Australian Cyber Security Strategy 2023 stands out as a pivotal roadmap, signifying the nation’s commitment to fortifying its…

North Korean Hackers Targeting CyberLink Users
23
Nov
2023

North Korean Hackers Targeting CyberLink Users

In the ever-evolving realm of cybersecurity, Microsoft Threat Intelligence has uncovered a sophisticated supply chain attack orchestrated by the North…

Cisco Patch HTTP/2 Rapid Reset Attack
23
Nov
2023

Kubernetes Secrets Allow Hackers Access Sensitive Environments

Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications.  Besides this, hackers…

DDoS Attacks
23
Nov
2023

Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS Attacks

Nov 23, 2023NewsroomVulnerability / Cyber Threat An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE)…