Author: Cybernoz
IN SUMMARY BAZAN suffered cyber attacks (DDoS attacks) over the weekend. The group that claimed responsibility for the attacks is…
As regulatory scrutiny intensifies, organisations must prepare for closer monitoring of their sustainability practices. Navigating the expanding landscape of rules…
누군가가 저에게 Application Security, Pentest 등에서 가장 활발하게 사용되는 도구를 선택하라고 하면 당연히 Burpsuite와 ZAP 같은 Proxy 도구를 선택할 것…
IPv4 addresses have been on the verge of extinction ever since the last decade. The boom of IoT (Internet of…
A new Android malware strain uses OCR (Optical Character Recognition) techniques to extract sensitive data from pictures. This new Android…
[ This article was originally published here ] The content of this post is solely the responsibility of the author. …
Threat actors are actively targeting exposed instances of SSH and Redis Redis open-source data store with a peer-to-peer self-replicating worm…
Spywares are software that is used as a surveillance application to collect sensitive information from victims and send it to…
Microsoft is held accountable for its poor cybersecurity procedures, which let China carry out a successful espionage campaign against the…
I heard a great thing on a podcast recently. It was a guy saying alcohol addiction is confused because people…
Reddit has upvoted Fredrick Lee into the CISO office. The San Francisco company on Monday announced the hiring of Lee…
Hackers are actively exploiting a ‘BleedingPipe’ remote code execution vulnerability in Minecraft mods to run malicious commands on servers and…











