Author: Cybernoz

New Codefinger Ransomware Abuses Amazon AWS to Encrypt S3 Buckets
14
Jan
2025

New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets

The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages AWS’s Server-Side…

Espionage Campaign
14
Jan
2025

Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware

Russia-linked threat actors have been attributed to an ongoing cyber espionage campaign targeting Kazakhstan as part of the Kremlin’s efforts…

First Ever OWASP "Top 10 Non-Human Identities (NHI)" Released
14
Jan
2025

First Ever OWASP “Top 10 Non-Human Identities (NHI)” Released

The Open Worldwide Application Security Project’s (OWASP) released the first “Non-Human Identities (NHI) Top 10 used to provide authorization to…

AI, Web3 and Decentralization: Tech Trends Shaping 2025’s Altcoin Season
14
Jan
2025

Tech Trends Shaping 2025’s Altcoin Season

Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain, and metaverse…

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored
14
Jan
2025

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored

What do identity risks, data security risks and third-party risks all have in common? They are all made much worse…

Generating customer experience at NatWest Bank
14
Jan
2025

Generating customer experience at NatWest Bank

Thank you for joining! Access your Pro+ Content below. 14 January 2025 Generating customer experience at NatWest Bank Share this…

Threat actors exploit Aviatrix Controller flaw to deploy backdoors and cryptocurrency miners
14
Jan
2025

Threat actors exploit Aviatrix Controller flaw to deploy backdoors and cryptocurrency miners

Threat actors exploit Aviatrix Controller flaw to deploy backdoors and cryptocurrency miners Pierluigi Paganini January 14, 2025 A critical vulnerability…

Zero-Day Vulnerability in PDF Files Leaking NTLM Data in Adobe & Foxit Reader
14
Jan
2025

Zero-Day Vulnerability in PDF Files Leaking NTLM Data in Adobe & Foxit Reader

Cybersecurity researchers at EXPMON have uncovered an intriguing “zero-day behavior” in PDF samples that could potentially be exploited by attackers…

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability
14
Jan
2025

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability

A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the public internet. The attacks, observed by…

Zero-Day Vulnerability
14
Jan
2025

Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces

Jan 14, 2025Ravie LakshmananVulnerability / Network Security Threat hunters are calling attention to a new campaign that has targeted Fortinet…

Developing AI datacentres: Has the UK government got what it takes?
14
Jan
2025

Developing AI datacentres: Has the UK government got what it takes?

Debate is raging about whether the UK government’s push to grow the number of homegrown datacentres with capabilities to host…

Google OAuth "Sign in with Google" Vulnerability Exposes Millions of Accounts
14
Jan
2025

Google OAuth “Sign in with Google” Vulnerability Exposes Millions of Accounts

A critical vulnerability in Google’s “Sign in with Google” authentication flow is putting millions of Americans at risk of data…