Author: Cybernoz
In a recent interview with Lotem Guy, VP of Product at Cycode, providing an innovative Application Security Posture Management (ASPM)…
A known ransomware group on Monday started publishing data allegedly stolen from the systems of Japanese watchmaking giant Seiko. Seiko…
There’s mounting evidence that Akira ransomware targets Cisco VPN (virtual private network) products as an attack vector to breach corporate…
The current rise of the Internet of Things (IoT) is at its peak and rapidly expanding its abilities by transforming…
New research released today from ThreatX, the leading API and application protection platform, reveals that consumers believe today’s cybersecurity talent…
Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT….
By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity…
By Giri Radhakrishnan, Technical Product Marketing Manager, Tigera Distributed Denial-of-Service (DDoS) attack techniques are evolving, creating new risks and challenges…
A recent HiatusRAT campaign has been targeting a US military procurement system for reconnaissance, cybersecurity firm Lumen reports. Initially observed…
Microsoft is adding the Python programming language to Microsoft Excel, allowing users to create powerful functions for analyzing and manipulating…
A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data…
By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network,…










