Author: Cybernoz

Ivanti patches second zero-day vulnerability being used in attacks
03
Aug
2023

Ivanti patches second zero-day vulnerability being used in attacks

Ivanti has issued a patch to address a second critical zero-day vulnerability that is under active attack. The vulnerability is said…

Australian Unity elevates data focus with new GM role
03
Aug
2023

Australian Unity elevates data focus with new GM role – Strategy – Training & Development

Australian Unity is bringing Bupa’s director of data technology Craig Rowlands into a newly-created general manager of enterprise data role….

Players and servers at risk from BleedingPipe vulnerability
03
Aug
2023

Players and servers at risk from BleedingPipe vulnerability

Minecraft players interested in modding are at risk from a remote code execution vulnerability targeting both players and servers. Minecraft…

Ivanti endpoint security needs security upgrade
03
Aug
2023

Ivanti endpoint security needs security upgrade – Security

Ivanti, which last week had to move on a vulnerability in its Endpoint Manager Mobile (EMM) product, has disclosed a…

How to use AWS SSM agent as backdoor and hack into EC2 instances?
03
Aug
2023

How to use AWS SSM agent as backdoor and hack into EC2 instances?

Amazon Web Services (AWS) has a novel post-exploitation approach that has been identified by researchers. This technique enables hackers to…

Salesforce email compromised for phishing attacks
02
Aug
2023

Salesforce email compromised for phishing attacks – Security – Cloud

Salesforce has patched a vulnerability in its email services that researchers discovered was being exploited in targeted phishing attacks against…

US House panel opens probe into email system hacks
02
Aug
2023

US House panel opens probe into email system hacks – Security

The US House of Representatives Oversight Committee is opening an investigation into China’s suspected involvement in recent breaches of Commerce…

Flipper Zero
02
Aug
2023

Fake FlipperZero sites promise free devices after completing offer

A site impersonating Flipper Devices promises a free Flipper Zero after completing an offer but only leads to shady browser…

What is Advanced Persistent Cyber Threat Hunting, and why is it important?
02
Aug
2023

What is Advanced Persistent Cyber Threat Hunting, and why is it important?

By Zachary Folk, Camelot Secure In cybersecurity, the threat landscape is becoming more complex daily. For example, Cybersecurity Ventures expects global cybercrime…

BeyondTrust reveals appliance vulnerability
02
Aug
2023

BeyondTrust reveals appliance vulnerability – Security

A remote access management vulnerability has emerged in BeyondTrust appliances. The security advisory is available to customers only, but security…

Hackers already installed web shells on 581 Citrix servers in CVE-2023-3519 attacksSecurity Affairs
02
Aug
2023

Hackers already installed web shells on 581 Citrix servers in CVE-2023-3519 attacksSecurity Affairs

Researchers warn that hundreds of Citrix servers have been hacked in an ongoing campaign exploiting the RCE CVE-2023-3519. Security researchers…

AWS calls for an emerging technology national advisory group
02
Aug
2023

AWS calls for an emerging technology national advisory group – Strategy – Software

Amazon Web Services has called for a national advisory group to assess practices and continually review generative AI use within…