Author: Cybernoz

EvilProxy Phishing Kit
10
Aug
2023

Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives

Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks aimed at high-ranking…

PSNI investigating second breach after laptop stolen
10
Aug
2023

PSNI investigating second breach after laptop stolen

The Police Service of Northern Ireland (PSNI) is probing a second breach of police officers’ personal data that came to…

Assign severity ratings on Attack Surface Custom Policies
10
Aug
2023

Spot risks with our new IP view

Our new IP view offers another point of view on the expanding attack surface Customers often tell us of instances…

UK Electoral Commission hacked – 40 Million Britons Data Exposed
10
Aug
2023

UK Electoral Commission Hacked – 40 Million Britons Data Exposed

The UK Electoral Commission, entrusted with safeguarding voter information, recently faced a complex breach that triggered a vital public notification. …

Leaked Yandex Code Breaks Open the Creepy Black Box of Online Advertising
10
Aug
2023

Leaked Yandex Code Breaks Open the Creepy Black Box of Online Advertising

The code also shows how Yandex can combine data from multiple services. McCrea says in one complex process, an adult’s…

Researchers Tricked Hackers into Reveal Their Secrets Using Honeypot
10
Aug
2023

Researchers Tricked Hackers into Reveal Their Secrets Using Honeypot

In the last three years, hackers unknowingly seeking data or malware deployment have found a seemingly vulnerable virtual machine that…

LastPass removes the master password from customers’ login with FIDO2 authenticators
10
Aug
2023

LastPass removes the master password from customers’ login with FIDO2 authenticators

LastPass announced the availability of FIDO2 authenticators, including biometrics, such as finger print or face ID, and hardware keys, for…

How the DSMA balances security and privacy with press freedom
10
Aug
2023

A non-conventional career journey into IT security

Demand for people with technology skills is increasing, but the talent pool is not growing fast enough, according to Harvey…

US Govt launches Artificial Intelligence Cyber ChallengeSecurity Affairs
10
Aug
2023

US Govt launches Artificial Intelligence Cyber ChallengeSecurity Affairs

The US Government House this week launched an Artificial Intelligence Cyber Challenge competition for creating a new generation of AI…

White House launches AI Cyber Challenge to make software more secure
10
Aug
2023

White House launches AI Cyber Challenge to make software more secure

The Biden-Harris Administration has launched a major two-year competition using AI to protect the United States’ most important software, such…

CISA adds recently disclosed Apple flaws to its Known Exploited Vulnerabilities catalogSecurity Affairs
10
Aug
2023

CISA adds actively exploited flaw in .NET, Visual Studio to its Known Exploited Vulnerabilities catalogSecurity Affairs

US CISA added zero-day vulnerability CVE-2023-38180 affecting .NET and Visual Studio to its Known Exploited Vulnerabilities catalog. US Cybersecurity and…

Understanding Changes in the OWASP API Security Top 10 List
10
Aug
2023

Understanding Changes in the OWASP API Security Top 10 List

The Open Web Application Security Project (OWASP),  a non-profit foundation devoted to web application security, recently released the 2023 OWASP…