Cybernoz - Cybersecurity News

Cybernoz - Cybersecurity News

  • Search for
  • Telegram
  • Switch skin
  • MalwareBytesweek in security
    February 5, 2024

    A week in security (January 29 – February 4)

  • TheHackerNewsiPhones
    February 5, 2024

    Pegasus Spyware Targeted iPhones of Journalists and Activists in Jordan

  • ComputerWeeklyIT security strategy: Assessing the risks of generative AI
    February 5, 2024

    IT security strategy: Assessing the risks of generative AI

  • TheCyberExpressSnatch Ransomware Group Claims The FDVA Cyber Attack
    February 5, 2024

    Decoding The Cloudflare Cyberattack: Here’s What Happened?

  • SecurityaffairsSoftware firm AnyDesk disclosed a security breach
    February 5, 2024

    Software firm AnyDesk disclosed a security breach

  • CyberSecurity-InsidersAnyDesk hit by ransomware and Cloudflare hacked
    February 5, 2024

    AnyDesk hit by ransomware and Cloudflare hacked

  • HelpnetSecurityResearchers discover exposed API secrets, impacting major tech tokens
    February 5, 2024

    Researchers discover exposed API secrets, impacting major tech tokens

  • CyberSecurityNewsCommando Cat Attacking Docker Endpoints to Install Crypto Miners
    February 5, 2024

    Commando Cat Attacking Docker Endpoints to Install Crypto Miners

  • GBHackersWebinar
    February 5, 2024

    Hackers Using 130,000+ Domains for Cyber Attacks

  • CyberSecurity-InsidersUnraveling the Differences: Hashing, Salting, and Encryption Explained
    February 5, 2024

    Unraveling the Differences: Hashing, Salting, and Encryption Explained

  • HelpnetSecurityLatio Application Security Tester: Use AI to scan your code
    February 5, 2024

    Latio Application Security Tester: Use AI to scan your code

  • ITnewsDTA gets more agencies to agree delivery milestones for digital projects
    February 5, 2024

    DTA gets more agencies to agree delivery milestones for digital projects – Strategy

Previous page Next page
Recent Posts
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
    Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
    July 17, 2025
  • Thousands of women in tech leave their roles each year
    Thousands of women in tech leave their roles each year
    July 17, 2025
  • AI hallucinations
    LameHug malware uses AI LLM to craft Windows data-theft commands in real-time
    July 17, 2025
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware
    Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware
    July 17, 2025
  • UNG0002 Actors Weaponize LNK Files via ClickFix Fake CAPTCHA Pages
    UNG0002 Actors Weaponize LNK Files via ClickFix Fake CAPTCHA Pages
    July 17, 2025
Close