Author: Cybernoz
The rapid growth in generative AI tech is dramatically changing the complete threat scenario since threat actors actively exploit this…
Shareholders of HUB Cyber Security Ltd. has filed a class action against the company, alleging misleading statements related to its…
Splunk has discovered a vulnerability that allows unauthenticated log injection, which could enable malicious actors to run harmful code on…
According to reports, a new Android malware is circulating under the guise of a fake chat application that is being…
Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure Iranian company known as Cloudzy are being leveraged by…
Akira ransomware group added U.S.-based software company Parathon to its victim list. The hackers claimed to have 560 GB of…
Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing…
High-profile ransomware attacks on corporations like Kaseya, Colonial Pipeline, and MOVEit may lead to the misconception that only large organizations…
Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov,…
The Italian organizations, including tax agencies, were targeted by a new malware downloader delivering banking Trojan. The new loader malware…
Microsoft has issued an alert on the OneNote spoofing vulnerability, patched previously. According to the latest update from Microsoft, the…
US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog….











