Author: Cybernoz
The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research…
In an era marked by relentless technological evolution and the omnipresence of cyber threats, the role of cybersecurity professionals has…
Sophisticated JaskaGO info stealer targets macOS and Windows Pierluigi Paganini December 20, 2023 JaskaGO is a new Go-based information stealer malware…
Web injections involve injecting malicious code into websites to manipulate content or redirect users to fraudulent sites. Threat actors use…
Comcast Cable Communications, LLC, operating under the brand name Xfinity, has suffered a massive data breach affecting 36 million users….
Argus Cyber Security unveiled its Argus vDome product, an anti-theft solution focused on protecting vehicles from CAN injection attacks. Car…
Dec 20, 2023The Hacker NewsBrandjacking / Cyber Threat Hands-On Review: Memcyco’s Threat Intelligence Solution Website impersonation, also known as brandjacking…
SSH protocol is one of the most used protocols across several organizations to establish a remote terminal login and file…
Researchers have discovered two novel techniques on GitHub: one exploits GitHub Gists, while the other involves sending commands through Git commit…
Telecommunications company Comcast has confirmed a breach that exposed personal information of more than 35.8 million of Xfinity customers. Exploiting…
Dec 20, 2023NewsroomIdentity Theft / SMS Phishing The Chinese-speaking threat actors behind Smishing Triad have been observed masquerading as the…
In a groundbreaking initiative spanning 34 countries, INTERPOL orchestrates Operation HAECHI IV, a relentless assault on online financial crime, yielding…











