Author: Cybernoz

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
05
Feb
2026

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

Ravie LakshmananFeb 05, 2026Malware / Cyber Espionage The elusive Iranian threat group known as Infy (aka Prince of Persia) has…

Forget AGI, business leaders are still trying to figure out how to make AI work
05
Feb
2026

Forget AGI, business leaders are still trying to figure out how to make AI work

The dramatic progress of AI and its impact on both the economy and society at large dominated the conversation throughout…

05
Feb
2026

Substack Discloses Breach Exposing Its User Details After Four-Month Delay

Data accessed in October 2025 went undetected until February, affecting subscribers across the newsletter platform with no evidence of misuse…

Threat Actors Hacking NGINX Servers to Redirect Web Traffic to Malicious Servers
05
Feb
2026

Threat Actors Hacking NGINX Servers to Redirect Web Traffic to Malicious Servers

Threat Actors Hacking NGINX Servers A sophisticated campaign in which threat actors are stealthily compromising NGINX servers to redirect web…

LockBit 5.0 Unveils Cross-Platform Threats for Windows, Linux & ESXi Systems
05
Feb
2026

LockBit 5.0 Unveils Cross-Platform Threats for Windows, Linux & ESXi Systems

The inner workings of LockBit 5.0, a sophisticated ransomware variant targeting Windows, Linux, and VMware ESXi systems simultaneously. This latest…

05
Feb
2026

Why a decade-old EnCase driver still works as an EDR killer

Attackers are leaning on a new EDR killer malware that can shut down 59 widely used endpoint security products by…

Flock cameras shared license plate data without permission
05
Feb
2026

Flock cameras shared license plate data without permission

Mountain View, California, pulled the plug on its entire license plate reader camera network this week. It discovered that Flock…

The Buyer’s Guide to AI Usage Control
05
Feb
2026

The Buyer’s Guide to AI Usage Control

Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and…

What should platform engineering look like?
05
Feb
2026

Half of Google’s software development now AI-generated

As much as half of all the code produced at Alphabet, the parent company of Google, is being generated by…

Betterment confirms data breach after wave of crypto scam emails
05
Feb
2026

Data breach at fintech firm Betterment exposes 1.4 million accounts

Hackers stole email addresses and other personal information from 1.4 million accounts after breaching the systems of automated investment platform…

Microsoft to Add Sysmon Threat Detection Feature Natively to Windows 11
05
Feb
2026

Microsoft to Add Sysmon Threat Detection Feature Natively to Windows 11

Microsoft Add Sysmon Windows 11 A major upgrade has been announced to enhance capabilities for cybersecurity defenders and threat hunters…

Weaponized Voicemail Hack Allows Remote Access to Systems, Experts Warn
05
Feb
2026

Weaponized Voicemail Hack Allows Remote Access to Systems, Experts Warn

A sophisticated social engineering campaign that weaponizes fake voicemail notifications to trick victims into installing remote access tools. The attack…