Author: Cybernoz
Cult of the Dead Cow (cDc) is one of the oldest and most highly influential hacking groups that was formed…
Cloud computing has revolutionized the way businesses operate by offering scalable, flexible, and cost-effective solutions. However, as data and applications…
Threat actors are evolving their techniques and tools at a rapid pace that is completely changing the current threat scenario….
The notorious Hacktivists group, Known as Mysterious Team Bangladesh, exploits vulnerable versions of PHPMyAdmin and WordPress. It conducts DDoS and…
Several cyber criminals recently targeted Citrix NetScaler ADC and Gateway Servers through a vulnerability identified as CVE-2023-3519, which holds a…
As the healthcare industry continues its rapid transformation through the adoption of digital technologies, it is also confronted with an…
Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must…
Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar,…
Researchers have found a new phishing tactic that uses Google Accelerated Mobile Pages (AMP) URLs to look trustworthy Researchers have…
Ransomware gangs are also starting to focus on exploiting zero-days for initial access. Ransomware attacks have shown no signs of…
We’ve made a handy flow chart to help IT and security folk decide if they’re ready to go on vacation….
Identity theft is a serious problem, especially when it affects children. As we have mentioned before, identity theft is a…











