Author: Cybernoz

Internet Explorer
18
May
2023

Microsoft shares more info on the end of Internet Explorer

Microsoft has decided to allow customers to choose when the last bits of Internet Explorer 11 (IE11) will be removed…

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?
18
May
2023

IT Security FAQ 10: What is malware, phishing, spyware, data mining and DDoS?

Malware is an umbrella term for viruses, trojans, spyware, adware etc. It is an abbreviation of “malicious software”. Spyware, as the…

SideWinder State-Sponsored Hacker Group
18
May
2023

State-Sponsored Hacker Group Stealthy Infrastructure Uncovered

Group-IB’s cybersecurity researchers made a significant discovery, revealing undisclosed attack infrastructure employed by the highly active state-sponsored group SideWinder. Their…

Google May Delete Your Old Accounts. Here’s How to Stop It
18
May
2023

Google May Delete Your Old Accounts. Here’s How to Stop It

On May 16, Google announced new plans to delete accounts that have been inactive for two years, as well as…

researchers Uncovered QakBot Malware
18
May
2023

Researchers Uncovered QakBot Malware C2 Infrastructure

Tam Cymru researchers have recently revealed noteworthy patterns and irregularities from their continuous monitoring of QakBot’s command and control infrastructure. …

Hacker arrest
18
May
2023

18-year-old charged with hacking 60,000 DraftKings betting accounts

The Department of Justice revealed today that an 18-year-old man named Joseph Garrison from Wisconsin had been charged with hacking…

Android Phone Hacking
18
May
2023

This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide

A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry out their malicious…

How does Pentesting fit into your overall security strategy?
18
May
2023

What To Do When You’re Stuck Hacking

Hacking can be tedious work. Sometimes you’ve been looking for hours, perhaps days, and you’re unable to find a security vulnerability….

Wordpress
18
May
2023

Hackers target vulnerable WordPress Elementor plugin after PoC released

Hackers are now actively probing for vulnerable Essential Addons for Elementor plugin versions on thousands of WordPress websites in massive…

OWASP TOP 10: XXE - Detectify Blog
18
May
2023

OWASP TOP 10: Security Misconfiguration

Security misconfiguration is the fifth vulnerability on OWASP‘s list of the ten most common vulnerabilities. A proof of concept video…

Beware of ChatGPT and Midjourney imposters
18
May
2023

Beware of ChatGPT and Midjourney imposters

To all those who are eagerly searching for ChatGPT login and Midjourney web pages, here’s an alert that needs your…

Bitwarden Passwordless.dev simplifies passkey implementation for developers
18
May
2023

Bitwarden Passwordless.dev simplifies passkey implementation for developers

Bitwarden released Bitwarden Passwordless.dev, the developer toolkit with an extensive, easy-to-deploy API for integrating FIDO2 WebAuthn-based passkeys into consumer websites…