Author: Cybernoz

Application Security From Code to Cloud – An Interview with Lotem Guy at Cycode
22
Aug
2023

Application Security From Code to Cloud – An Interview with Lotem Guy at Cycode

In a recent interview with Lotem Guy, VP of Product at Cycode, providing an innovative Application Security Posture Management (ASPM)…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
22
Aug
2023

Ransomware Group Starts Leaking Data From Japanese Watchmaking Giant Seiko

A known ransomware group on Monday started publishing data allegedly stolen from the systems of Japanese watchmaking giant Seiko. Seiko…

Hacker
22
Aug
2023

Akira ransomware targets Cisco VPNs to breach organizations

There’s mounting evidence that Akira ransomware targets Cisco VPN (virtual private network) products as an attack vector to breach corporate…

Smart Bulbs Hacked
22
Aug
2023

Smart Bulbs can be Hacked to Steal Wi-Fi Passwords

The current rise of the Internet of Things (IoT) is at its peak and rapidly expanding its abilities by transforming…

Digital skills gap is challenging the cyber security of UK businesses
22
Aug
2023

90% of Consumers Worry Cybersecurity’s Future Is in Jeopardy if Students Aren’t Exposed to the Field at an Earlier Age

New research released today from ThreatX, the leading API and application protection platform, reveals that consumers believe today’s cybersecurity talent…

Researchers Uncovered the Developer of CypherRAT & CraxsRAT
22
Aug
2023

Researchers Uncovered the Developer of CypherRAT & CraxsRAT

Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT….

OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment
22
Aug
2023

OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment

By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity…

DDoS Attacks in a Kubernetes Environment: Detection and Mitigation
22
Aug
2023

DDoS Attacks in a Kubernetes Environment: Detection and Mitigation

By Giri Radhakrishnan, Technical Product Marketing Manager, Tigera Distributed Denial-of-Service (DDoS) attack techniques are evolving, creating new risks and challenges…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
22
Aug
2023

US Military Targeted in Recent HiatusRAT Attack

A recent HiatusRAT campaign has been targeting a US military procurement system for reconnaissance, cybersecurity firm Lumen reports. Initially observed…

Python and Excel
22
Aug
2023

Microsoft Excel to let you run Python scripts as formulas

Microsoft is adding the Python programming language to Microsoft Excel, allowing users to create powerful functions for analyzing and manipulating…

Apache Ivy Injection Flaw
22
Aug
2023

Apache Ivy Injection Flaw Let Attackers Exfiltrate Sensitive Data

A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data…

Network Architecture Mapping Improves Security Posture and Saves Big Bucks
22
Aug
2023

Network Architecture Mapping Improves Security Posture and Saves Big Bucks

By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network,…