Author: Cybernoz
A new edition of the “VirusTotal Malware Trends Report” series, which focuses mostly on “Emerging Formats and Delivery Techniques,” has…
Jul 28, 2023THNCyber Espionage / Malware The Russian nation-state actor known as BlueBravo has been observed targeting diplomatic entities throughout…
AMD Zenbleed 2 processors were found vulnerable to use-after-free flaws, enabling data theft. While the exploitation of this flaw demands…
SolarWinds announces the release of SolarWinds Platform 2023.3, which includes new features and platform upgrades. Further, the release notes detail…
One of the most commonly exploited forms of vulnerability in web applications was highlighted in a joint advisory by international…
The issue of how to prevent insider threats without infringing on employee privacy is one that has been a hot…
Trustwave’s open-source Web Application Firewall (WAF) engine, ModSecurity, faces DoS risk due to four transformation actions vulnerability. Cybersecurity researchers at…
Reports indicate that there have been three critical flaws including DDoS and Remote code execution discovered in the Microsoft Message…
Microsoft and Samsung Technology have joined forces to enhance mobile device security for enterprises. This collaboration has resulted in the…
The world has recently witnessed a surge in cyber attacks, and the United States is no exception. A relatively new…
Malware authors persistently seek novel approaches to exploit unsuspecting users in the active cyber threat landscape. To easily locate all…
Hybrid work models and broadly adopted cloud technology disperse operations extensively; data is moved, stored, and accessed from highly distributed…











