Author: Cybernoz

China-based Silver Fox spoofs healthcare app to deliver malware
25
Feb
2025

China-based Silver Fox spoofs healthcare app to deliver malware

Silver Fox, a China-based threat actor that may or may not be backed by the Chinese government, has been delivering…

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site
25
Feb
2025

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site

Cybersecurity researchers uncovered a sophisticated macOS malware campaign distributing the Poseidon Stealer through a counterfeit DeepSeek AI platform website.  This…

Jane Devry
25
Feb
2025

How healthcare cyber risk teams can plan ahead for HIPAA’s Security Rule update

Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers,…

Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign
25
Feb
2025

Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign

Dive Brief: GreyNoise researchers observed active exploitation of two Cisco vulnerabilities, CVE-2018-0171 and CVE-2023-20198, which reportedly have been used in recent…

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings
25
Feb
2025

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings

INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small…

broken lock
25
Feb
2025

Background check provider data breach affects 3 million people who may not have heard of the company

Employment screening company DISA Global Solutions has filed a data breach notification after a cyber incident on their network. DISA…

EU sanctioned the leader of North Korea-linked APT groups
25
Feb
2025

EU sanctioned the leader of North Korea-linked APT groups

EU sanctioned the leader of North Korea-linked APT groups Pierluigi Paganini February 25, 2025 The European Union sanctioned the leader…

Making security a business value enabler, not a gatekeeper 
25
Feb
2025

Making security a business value enabler, not a gatekeeper 

The traditional perception of security within an organization is as a barrier rather than a facilitator, imposing approval processes and…

PortSwigger and SAP forge strategic partnership to enhance enterprise web security
25
Feb
2025

PortSwigger and SAP forge strategic partnership to enhance enterprise web security

Andrzej Matykiewicz | 25 February 2025 at 14:34 UTC In today’s rapidly evolving digital landscape, securing web applications at scale…

200 Malicious GitHub Repos Attacking Developers to Deliver Malware
25
Feb
2025

200 Malicious GitHub Repos Attacking Developers to Deliver Malware

In an era where open-source collaboration drives software innovation, a sophisticated cyber campaign dubbed GitVenom has emerged as a critical…

Jane Devry
25
Feb
2025

Zero Trust, Maximum Impact: Strategies from Leading Federal Agencies

As federal agencies move beyond the Office of Management and Budget’s (OMB) September 2024 zero trust implementation deadline, achieving comprehensive…

16 Malicious Chrome Extensions Infected Over 3.2 Million Users
25
Feb
2025

16 Malicious Chrome Extensions Infected Over 3.2 Million Users

A coordinated campaign involving at least 16 malicious Chrome extensions infected over 3.2 million users worldwide, leveraging browser security vulnerabilities…