Author: Cybernoz

16 Zero-Day Flaws Discovered in CODESYS Industrial Devices
09
Aug
2023

16 Zero-Day Flaws Discovered in CODESYS Industrial Devices

CODESYS, a widely-used integrated environment for controller programming, holds a strong presence in Operational Technology across diverse industries, such as:-…

Rust-Based Injector Deploys XWorm and Remcos RAT in Multi-Stage Attack
09
Aug
2023

Rust-Based Injector Deploys XWorm and Remcos RAT in Multi-Stage Attack

Rust Injector Emergence: A novel Rust-based injector has emerged, facilitating the deployment of the XWorm malware and Remcos RAT. Multi-Stage…

Rising Threat of 'Hackers for Hire' - How End-to-End Encryption Software Safeguards Businesses
09
Aug
2023

Rising Threat of ‘Hackers for Hire’ – How End-to-End Encryption Software Safeguards Businesses

By Istvan Lam, CEO of Tresorit According to a new report from the UK’s cyber security agency, the National Cyber…

Side-Channel Attacks Affecting Modern CPUs
09
Aug
2023

New Side-Channel Attacks Affecting Modern CPUs

Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from…

Outpost24 IoT header image
09
Aug
2023

Preventative medicine for securing IoT tech in healthcare organizations

The widespread adoption of a digital transformation workspace and the shift to web applications has led to a global rise…

Microsoft Added GPT-4 and GPT-35-Turbo to businesses Azure AI infrastructure
09
Aug
2023

Microsoft Added GPT-4 and GPT-35-Turbo to Azure AI Infrastructure

Azure announced the global expansion of Azure OpenAI Service, including GPT-4 and GPT-35-Turbo, to its customers across the world. Azure…

RedHotel Chinese APT Hackers Attack Government Entities
09
Aug
2023

RedHotel Chinese APT Hackers Attack Government Entities

RedHotel (TAG-22), a Chinese-state-sponsored threat group, is well-known for its persistence, prominence, operational intensity, and global reach. RedHotel is reported…

Fortifying Defences: Cybersecurity in the Dawn of AI
09
Aug
2023

Fortifying Defences: Cybersecurity in the Dawn of AI

By Daniel Hofmann, CEO of Hornetsecurity Large Language Models (LLM) and Generative AI technologies like ChatGPT, have brought significant benefits…

Google Chrome
09
Aug
2023

Google to fight hackers with weekly Chrome security updates

Google has changed the Google Chrome security updates schedule from bi-weekly to weekly to address the growing patch gap problem…

Interpol Shut Down Phishing-As-A-Service (PAAS) Platform That Hacked 70,000 Users
09
Aug
2023

Interpol Shut Down Phishing-As-A-Service (PAAS) Platform

Interpol Shut Down Phishing-As-A-Service (PAAS) Platform That Hacked 70,000 Users. Due to phishing-as-a-service (PAAS) platforms, cybercriminals typically have a one-stop…

India to replace all its defense related Microsoft systems with Maya OS due to Ransomware
09
Aug
2023

India to replace all its defense related Microsoft systems with Maya OS due to Ransomware

As the frequency of ransomware attacks targeting Indian defense digital infrastructure continues to rise, the administration under the leadership of…

Vicarius vuln_GPT enables security teams to find and fix software vulnerabilities
09
Aug
2023

Vicarius vuln_GPT enables security teams to find and fix software vulnerabilities

Vicarius launched vuln_GPT, an LLM model trained to generate remediation scripts for software vulnerabilities in the race to find and…