Author: Cybernoz

Gafgyt botnet is targeting EoL Zyxel routers
11
Aug
2023

Gafgyt botnet is targeting EoL Zyxel routers

Researchers warn that the Gafgyt botnet is actively exploiting a vulnerability impacting the end-of-life Zyxel P660HN-T1A router. A variant of…

New account takeover campaign targets over 100 corporations’ top executives
11
Aug
2023

New account campaign targets 100 corporations’ top executives

The top-level executives at more than 100 global organizations have been shaken by cloud account takeover incidents. Leveraging the power…

Dating Apps And Sites: Mitigating Chargebacks In 2023
11
Aug
2023

Hacker Claims Indian Ministry Data Breach Ahead Of Independence Day

A threat actor known as ‘Fredens-of-security’ on BreachForums has reportedly taken credit for exposing sensitive data linked to India’s Ministry…

Transforming workplace productivity through artificial intelligence
11
Aug
2023

Transforming workplace productivity through artificial intelligence – Partner Content

Artificial intelligence is disrupting global business and economies in unprecedented ways, a trend set to become more pronounced over the…

Microsoft .NET Core and Visual Studio Flaw Let hackers Launch Denial of Service Attack
11
Aug
2023

Microsoft .NET and Visual Studio Flaw

As per reports, Microsoft .NET core and Visual Studio were found with a Denial of Service, which can be exploited…

Dramatic Surge in Social Engineering and Web Attacks
11
Aug
2023

Dramatic Surge in Social Engineering and Web Attacks

The Second quarter of 2023 has shown a significant increase in the overall cyber-threat risks. The blocking of unique web…

Google limits internet access to employees to save them from Cyber Attacks
11
Aug
2023

Connecticut school loses millions in Spoofing Cyber Attack

A sophisticated cyber attack orchestrated by unidentified cyber criminals has resulted in the unlawful acquisition of $6 million from a…

11
Aug
2023

Threat intelligence’s key role in mitigating malware threats

Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according…

11
Aug
2023

Indonesian Data Center Hacking Claimed By ThreatSec

The ThreatSec hacker group has taken responsibility for infiltrating a data center under the jurisdiction of the Indonesian government. According…

Charming Kitten APT is targeting Iranian dissidents in GermanySecurity Affairs
11
Aug
2023

Charming Kitten APT is targeting Iranian dissidents in GermanySecurity Affairs

Germany’s Federal Office for the Protection of the Constitution (BfV) warns that the Charming Kitten APT group targeted Iranian dissidents…

Authorities Taken Down Bulletproof Hosting
11
Aug
2023

Researchers Uncover Series of Ransomware Attacks

Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well. Numerous…

How to Draft an Effective Data Protection Strategy
11
Aug
2023

Ensuring HIPAA Compliance on Mobile Devices: A Vital Guide

In today’s digital age, where mobile devices have become an integral part of healthcare delivery and patient management, maintaining the…