Author: Cybernoz

Now Abyss Locker also targets VMware ESXi serversSecurity Affairs
29
Jul
2023

Now Abyss Locker also targets VMware ESXi serversSecurity Affairs

A Linux variant of the Abyss Locker designed to target VMware ESXi servers appeared in the threat landscape, experts warn….

Dating Apps And Sites: Mitigating Chargebacks In 2023
29
Jul
2023

Education Sector Ransomware Attacks Skyrocket In 2023

Ransomware attacks have become a persistent threat, with their numbers steadily rising over the years. Among the sectors significantly affected…

Google Chrome
29
Jul
2023

Browser developers push back on Google’s “web DRM” WEI API

Google’s plans to introduce the Web Environment Integrity (WEI) API on Chrome has been met with fierce backlash from internet…

Hand holding a key
29
Jul
2023

Linux version of Abyss Locker ransomware targets VMware ESXi servers

The Abyss Locker operation is the latest to develop a Linux encryptor to target VMware’s ESXi virtual machines platform in…

BreachForums Breached PII Data of 210,000 Sold Online
29
Jul
2023

Original BreachForums Breached, PII Data of 210K Users Sold Online

In Summary The breached forum is BreachForums, started by PomPomPurin. The database was shared by “breached_db_person” with HaveIBeenPwned. The database…

API1:2023 Broken Object Level Authorization
29
Jul
2023

API1:2023 Broken Object Level Authorization

Welcome to the 2nd post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a…

Roundup of Threat and Vulnerability
29
Jul
2023

Weekly Roundup of Threat and Vulnerability from July 23rd to 29th

This week’s Threat and Vulnerability Roundup is here! We at Cyber Writes take pride in delivering a weekly roundup of…

‘Call of Duty: Modern Warfare 2’ Players Hit With Worm Malware
29
Jul
2023

‘Call of Duty: Modern Warfare 2’ Players Hit With Worm Malware

According to TechCrunch it is unclear why the malware is spreading or what exactly the impact is on gamers. Valve,…

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?
29
Jul
2023

What Can We Learn by Analyzing 197 Years of Cumulative Cybersecurity Testing?

By Carolyn Crandall, Chief Security Advocate, Cymulate Each year, Cymulate releases a Cybersecurity Effectiveness Report that summarizes and analyzes the…

41 Zero-days Exploited
29
Jul
2023

41 Zero-days Exploited In-the-Wild in 2022

In 2022, the detection of zero-day exploits in the wild decreased by 40% compared to the previous year.  41 in-the-wild…

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023
29
Jul
2023

Why Dwell Time is the Biggest Threat to Security Operations Center (SOC) Teams in 2023

By Sanjay Raja, VP of Product, Gurucul Dwell time, or the length of time a cyber attacker remains hidden within…

Twitter X upside down
29
Jul
2023

Apple rejects new name ‘X’ for Twitter iOS app because… rules

Mr. Musk may have successfully pushed Twitter’s new name and logo, ‘X’, and even made the vanity domain x.com redirect to…