Author: Cybernoz

Phishers Exploit Salesforce's Email Services Zero-Day in Targeted Facebook Campaign
02
Aug
2023

Phishers Exploit Salesforce’s Email Services Zero-Day in Targeted Facebook Campaign

Aug 02, 2023THNVulnerability / A sophisticated Facebook phishing campaign has been observed exploiting a zero-day flaw in Salesforce’s email services,…

Hiring women could close tech skills gap, says tech professionals
02
Aug
2023

Hiring women could close tech skills gap, says tech professionals

Many think a focus on recruiting women into the tech sector could help to close longstanding IT skills gaps, according…

Beware of BOLA (IDOR) Vulnerabilities in Web Apps and APIs
02
Aug
2023

Beware of BOLA (IDOR) Vulnerabilities in Web Apps and APIs

Introduction In a recent advisory, the Cybersecurity and Infrastructure Security Agency (CISA) warned vendors, designers, developers, and end-user organizations of…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
02
Aug
2023

New hVNC macOS Malware Advertised on Hacker Forum

A new Hidden Virtual Network Computing (hVNC) malware targeting macOS devices is being advertised on a prominent cybercrime forum, Israeli…

Mandiant Almost Gone header
02
Aug
2023

Why Every Security Practitioner Should Attend mWISE

What’s in store for mWISE 2023? 80+ curated sessions. 90+ hand-picked speakers. 7 session tracks. All the hottest topics in…

Microsoft and Samsung launch Advanced Mobile Security Solution
02
Aug
2023

Juice Jacking Cyber Attack: The Hidden Threat at Public Charging Stations

In an increasingly connected world, our mobile devices have become essential tools for communication, work, and entertainment. However, the constant…

Belgian researchers build energy-efficient AI frameworks
02
Aug
2023

The rise of Generative AI in software development

Generative AI and large language models (LLMs) aren’t completely new technologies, but the world reached a greater awareness of their…

Rolls Royce targeted in a sophisticated Cyber Attack with potential Data Breach
02
Aug
2023

Rolls Royce targeted in a sophisticated Cyber Attack with potential Data Breach

Rolls-Royce, the renowned British manufacturing giant, has fallen victim to a sophisticated cyber attack resulting in potential data theft related…

Attackers can turn AWS SSM agents into remote access trojans
02
Aug
2023

Attackers can turn AWS SSM agents into remote access trojans

Mitiga researchers have documented a new post-exploitation technique attackers can use to gain persistent remote access to AWS Elastic Compute…

Remote Access Trojan
02
Aug
2023

Researchers Uncover AWS SSM Agent Misuse as a Covert Remote Access Trojan

Aug 02, 2023THNCloud Security / Cyber Threat Cybersecurity researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS)…

Ivanti MDM users told to patch against two dangerous flaws
02
Aug
2023

Ivanti MDM users told to patch against two dangerous flaws

Users of Ivanti’s Endpoint Manager Mobile (EPMM) mobile device management (MDM) platform have been warned to act now to patch…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
02
Aug
2023

Google AMP Abused in Phishing Attacks Aimed at Enterprise Users

Threat actors have been observed abusing Google Accelerated Mobile Pages (AMP) in phishing campaigns, as a new tactic to evade…