Author: Cybernoz

Hacker group creating Framework
04
Aug
2023

Hacker Group of 1980s Returns With Secure Coding Framework

Cult of the Dead Cow (cDc) is one of the oldest and most highly influential hacking groups that was formed…

Data Security firm Imperva to be acquired by Thales for $3.5 billion
04
Aug
2023

Key Concepts in Cloud Security for Beginners

Cloud computing has revolutionized the way businesses operate by offering scalable, flexible, and cost-effective solutions. However, as data and applications…

Hacker Group Builds New Infrastructure With 94 Domains
04
Aug
2023

Hacker Group Builds New Infrastructure With 94 Domains

Threat actors are evolving their techniques and tools at a rapid pace that is completely changing the current threat scenario….

Mysterious Team Bangladesh Hackers Launched 750 DDoS Attacks
04
Aug
2023

Mysterious Team Bangladesh Hackers Launched 750 DDoS Attacks

The notorious Hacktivists group, Known as Mysterious Team Bangladesh, exploits vulnerable versions of PHPMyAdmin and WordPress. It conducts DDoS and…

Submarine Cables vulnerable to Cyber Attacks
04
Aug
2023

Citrix servers hacked because of a vulnerability

Several cyber criminals recently targeted Citrix NetScaler ADC and Gateway Servers through a vulnerability identified as CVE-2023-3519, which holds a…

The direct impact of cyberattacks on patient safety and care delivery
04
Aug
2023

The direct impact of cyberattacks on patient safety and care delivery

As the healthcare industry continues its rapid transformation through the adoption of digital technologies, it is also confronted with an…

Multi-modal data protection with AI’s help
04
Aug
2023

Multi-modal data protection with AI’s help

Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must…

New infosec products of the week: August 4, 2023
04
Aug
2023

New infosec products of the week: August 4, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar,…

Phishing campaigns are using AMP URLs to avoid detection
04
Aug
2023

Phishing campaigns are using AMP URLs to avoid detection

Researchers have found a new phishing tactic that uses Google Accelerated Mobile Pages (AMP) URLs to look trustworthy Researchers have…

Global ransomware attacks at an all-time high, shows latest 2023 State of Ransomware report
04
Aug
2023

Global ransomware attacks at an all-time high, shows latest 2023 State of Ransomware report

Ransomware gangs are also starting to focus on exploiting zero-days for initial access. Ransomware attacks have shown no signs of…

Hey, are you REALLY ready to go on vacation? (No, you aren't)
04
Aug
2023

Hey, are you REALLY ready to go on vacation? (No, you aren’t)

We’ve made a handy flow chart to help IT and security folk decide if they’re ready to go on vacation….

How to protect your child's identity
04
Aug
2023

How to protect your child’s identity

Identity theft is a serious problem, especially when it affects children. As we have mentioned before, identity theft is a…