Author: Cybernoz

Credit cards
04
Jun
2023

Hackers hijack legitimate sites to host credit card stealer scripts

A new Magecart credit card stealing campaign hijacks legitimate sites to act as “makeshift” command and control (C2) servers to…

CISA
04
Jun
2023

CISA orders govt agencies to patch MOVEit bug used for data theft

CISA has added an actively exploited security bug in the Progress MOVEit Transfer managed file transfer (MFT) solution to its…

webserver
04
Jun
2023

Web Server Penetration Testing Checklist

Web server pentesting is performed under 3 significant categories: Identity, Analyse, and Report Vulnerabilities such as authentication weakness, configuration errors, and protocol…

Week in review: MOVEit Transfer critical zero-day vulnerability, Kali Linux 2023.2 released
04
Jun
2023

Week in review: MOVEit Transfer critical zero-day vulnerability, Kali Linux 2023.2 released

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: MOVEit Transfer zero-day attacks: The…

PCI Penetration Testing – What Should You Know? A Detailed Guide
03
Jun
2023

What is PCI Penetration Testing?

Organizations dealing with card payment data must comply with the Payment Card Industry Data Security Standard (PCI DSS) to protect…

Zyxel
03
Jun
2023

Zyxel shares tips on protecting firewalls from ongoing attacks

Zyxel has published a security advisory containing guidance on protecting firewall and VPN devices from ongoing attacks and detecting signs…

Phishing
03
Jun
2023

Online sellers targeted by new information-stealing malware campaign

Online sellers are targeted in a new campaign to push the Vidar information-stealing malware, allowing threat actors to steal credentials…

Hacking Apple macOS devices exploiting the Migration Assistant
03
Jun
2023

Hacking Apple macOS devices exploiting the Migration Assistant

A vulnerability that was only recently found and given the name “Migraine” is connected to macOS migration functionality and represents…

AI Is Being Used to ‘Turbocharge’ Scams
03
Jun
2023

AI Is Being Used to ‘Turbocharge’ Scams

Code hidden inside PC motherboards left millions of machines vulnerable to malicious updates, researchers revealed this week. Staff at security firm…

Google Drive Security Flaw
03
Jun
2023

Google Drive Security Flaw Let Hackers Exfiltrate Data

Google Drive is one of the most used cloud-based storage platforms, and due to its immense popularity and capabilities, it’s…

How AI Protects (and Attacks) Your Inbox
03
Jun
2023

How AI Protects (and Attacks) Your Inbox

When Aparna Pappu, vice president and general manager of Google Workspace, spoke at Google I/O on May 10, she laid…

Splunk Flaw
03
Jun
2023

Splunk Flaw Let Attackers Escalate Privilege

Splunk is one of the most used SIEM (Security Incident and Event Management) tools worldwide. Splunk can collect logs of…