Author: Cybernoz

P2PInfect Worm
20
Jul
2023

New P2PInfect Worm Targeting Redis Servers on Linux and Windows Systems

Jul 20, 2023THNMalware / Cyber Threat Cybersecurity researchers have uncovered a new cloud targeting, peer-to-peer (P2P) worm called P2PInfect that…

Microsoft
20
Jul
2023

Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats

Jul 20, 2023THNCloud Security / Cyber Espionage Microsoft on Wednesday announced that it’s expanding cloud logging capabilities to help organizations…

Australian Prime Minister urges citizens to turn off their mobile phones to fend cyber attacks
20
Jul
2023

Russia issues ban on Apple iPhone for security reasons

Russia has issued a ban on the usage of Apple iPhones in government and military sector until further orders. The…

Why data travel is healthcare’s next big cybersecurity challenge
20
Jul
2023

Why data travel is healthcare’s next big cybersecurity challenge

Do you know where your patients’ data lives once it’s in the cloud? Unfortunately, for many healthcare organizations, the answer…

67% of daily security alerts overwhelm SOC analysts
20
Jul
2023

67% of daily security alerts overwhelm SOC analysts

Today’s security operations (SecOps) teams are tasked with protecting progressively sophisticated, fast-paced cyberattacks, according to Vectra AI. Yet, the complexity…

ColdFusion Vulnerability
20
Jul
2023

Adobe Rolls Out New Patches for Actively Exploited ColdFusion Vulnerability

Jul 20, 2023THNSoftware Security / Vulnerability Adobe has released a fresh round of updates to address an incomplete fix for…

Hackers Actively Exploit Multiple Adobe ColdFusion Vulnerabilities
20
Jul
2023

Hackers Actively Exploit Multiple Adobe ColdFusion Vulnerabilities

On July 11, Adobe coordinated with the vendor to fix several ColdFusion vulnerabilities, including CVE-2023-29298. But it’s been reported that…

Exploring the macro shifts in enterprise security
20
Jul
2023

Exploring the macro shifts in enterprise security

The number of successful ransomware attacks and data breach attempts fell by 30% over the last year, the number of…

Cloud Security Best Practices Guide
20
Jul
2023

Cloud Security Best Practices Guide

As the world moves increasingly into a digital realm, the security of data stored in the cloud is an ever-growing…

Hackers Deactivate WhatsApp
20
Jul
2023

Hackers Could Deactivate Your WhatsApp Account

It has been reported that any individual could potentially deactivate a WhatsApp account by sending an email, and currently, there…

OWASP Top 10 LLMs
20
Jul
2023

OWASP Released Top 10 Critical Vulnerabilities for LLMs

OWASP Foundation has released the 0.9.0 version of Critical Vulnerabilities in LLMs (Large Language Models). A groundbreaking initiative has emerged…

Microsoft validation error allowed state actor to access user email of government agencies and others
20
Jul
2023

Microsoft validation error allowed state actor to access user email of government agencies and others

Due to a validation error in Microsoft code, a suspected Chinese attacker was able to access user email from approximately…