Author: Cybernoz

Hackers Released New Black Hat AI Tools XXXGPT and Wolf GPT
02
Aug
2023

Hackers Released New Black Hat AI Tools XXXGPT and Wolf GPT

The rapid growth in generative AI tech is dramatically changing the complete threat scenario since threat actors actively exploit this…

Investor Sue HUB Cyber Security For Misleading Statements
02
Aug
2023

Investor Sue HUB Cyber Security For Misleading Statements

Shareholders of HUB Cyber Security Ltd. has filed a class action against the company, alleging misleading statements related to its…

Splunk SOAR Unauthenticated Log Injection Let attackers Execute Malicious Code
02
Aug
2023

Splunk SOAR Log Injection – Execute Malicious Code

Splunk has discovered a vulnerability that allows unauthenticated log injection, which could enable malicious actors to run harmful code on…

New Android Malware Via WhatsApp Steal Call logs
02
Aug
2023

New Android Malware Via WhatsApp Steal Call logs

According to reports, a new Android malware is circulating under the guise of a fake chat application that is being…

anian Company Cloudzy
02
Aug
2023

Iranian Company Cloudzy Accused of Aiding Cybercriminals and Nation-State Hackers

Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure Iranian company known as Cloudzy are being leveraged by…

02
Aug
2023

Akira Ransomware Claims 560 GB Data

Akira ransomware group added U.S.-based software company Parathon to its victim list. The hackers claimed to have 560 GB of…

Canon Wi-Fi connection settings Flaw Expose Sensitive Data
02
Aug
2023

Canon Printers Wi-Fi connection settings Flaw

Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing…

Organizations with 51-200 Employees Targeted by Ransomware
02
Aug
2023

Organizations with 51-200 Employees Targeted by Ransomware

High-profile ransomware attacks on corporations like Kaseya, Colonial Pipeline, and MOVEit may lead to the misconception that only large organizations…

What are the Hidden Dangers of .zip Domains and How Can they Mislead Users?
02
Aug
2023

What are the Hidden Dangers of .zip Domains

Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov,…

New WikiLoader Malware Deliver Through Weaponized Files
02
Aug
2023

New WikiLoader Malware Deliver Through Weaponized Files

The Italian organizations, including tax agencies, were targeted by a new malware downloader delivering banking Trojan. The new loader malware…

Dating Apps And Sites: Mitigating Chargebacks In 2023
02
Aug
2023

OneNote Spoofing Vulnerability CVE-2023-33140: Update Issued

Microsoft has issued an alert on the OneNote spoofing vulnerability, patched previously. According to the latest update from Microsoft, the…

CISA adds recently disclosed Apple flaws to its Known Exploited Vulnerabilities catalogSecurity Affairs
02
Aug
2023

CISA adds second Ivanti EPMM flaw to its Known Exploited Vulnerabilities catalogSecurity Affairs

US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog….