Author: Cybernoz

week in security
15
Dec
2025

A week in security (December 8 – December 14)

Last week on Malwarebytes Labs: On the ThreatDown blog: Stay safe! We don’t just report on threats—we help safeguard your…

report-ad-banner
15
Dec
2025

The Execution Playbook For Indian Companies

Shashank Bajpai, CISO & CTSO at Yotta 2026 is the execution year for India’s Digital Personal Data Protection (DPDP) regime…

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution
15
Dec
2025

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code…

New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems
15
Dec
2025

New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems

CyberVolk, a pro-Russia hacktivist group first documented in late 2024, has resurfaced with a sophisticated ransomware-as-a-service (RaaS) offering called VolkLocker…

Prometheus: Open-source metrics and monitoring systems and services
15
Dec
2025

Prometheus: Open-source metrics and monitoring systems and services

Prometheus is an open-source monitoring and alerting system built for environments where services change often and failures can spread fast….

CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation
15
Dec
2025

CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

A critical vulnerability affecting Sierra Wireless routers has been added to its Known Exploited Vulnerabilities (KEV) catalog. This decision comes…

EDR Process Sideloading to Conceal Malicious Activity
15
Dec
2025

EDR Process Sideloading to Conceal Malicious Activity

Initial access broker Storm-0249 has evolved from a mass phishing operation into a sophisticated threat actor weaponizing legitimate Endpoint Detection…

How researchers are teaching AI agents to ask for permission the right way
15
Dec
2025

How researchers are teaching AI agents to ask for permission the right way

People are starting to hand more decisions to AI agents, from booking trips to sorting digital files. The idea sounds…

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
15
Dec
2025

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

Dec 15, 2025Ravie LakshmananRansomware / Cybercrime The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new…

report-ad-banner
15
Dec
2025

Asahi Group Considers New Cybersecurity Unit After Attack

Asahi Group Holdings Ltd. is weighing the creation of a dedicated cybersecurity unit as it continues to deal with the…

Europe's DMA raises new security worries for mobile ecosystems
15
Dec
2025

Europe’s DMA raises new security worries for mobile ecosystems

Mobile security has long depended on tight control over how apps and services interact with a device. A new paper…

Manufacturing is becoming a test bed for ransomware shifts
15
Dec
2025

Manufacturing is becoming a test bed for ransomware shifts

Manufacturing leaders may feel that ransomware risk has settled, but new data shows the threat is shifting in ways that…