Author: Cybernoz

Jane Devry
20
Feb
2025

Responsible AI: The Critical Competitive Advantage of 2025

Artificial intelligence (AI) has reached an inflection point. Once considered an experimental technology, AI is now embedded in the core…

Microsoft overcomes quantum barrier with new particle
20
Feb
2025

Microsoft overcomes quantum barrier with new particle

Microsoft has published the culmination of 20 years of research into subatomic particles, known as Majorana fermions, which it aims…

Microsoft
20
Feb
2025

Microsoft fixes Power Pages zero-day bug exploited in attacks

Microsoft has issued a security bulletin for a high-severity elevation of privilege vulnerability in Power Pages, which hackers exploited as…

Jane Devry
20
Feb
2025

The Human Factor: How Eliminating Human Vulnerabilities Can Stop Social Engineering Fraud

Fraud is becoming more sophisticated, targeting companies with increased precision, especially in two critical areas: Accounts Payable (AP) and Payment…

PRevent: Open-source tool to detect malicious code in pull requests
20
Feb
2025

PRevent: Open-source tool to detect malicious code in pull requests

Apiiro security researchers have released open source tools that can help organizations detect malicious code as part of their software…

DeepSeek found to be sharing user data with TikTok parent company ByteDance
20
Feb
2025

DeepSeek found to be sharing user data with TikTok parent company ByteDance

A couple of weeks ago we reported on the concerns surrounding data collection and security at DeepSeek, the Chinese AI…

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
20
Feb
2025

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families…

Privacy at a crossroads in the age of AI and quantum
20
Feb
2025

Privacy at a crossroads in the age of AI and quantum

The digital landscape is entering a critical turning point, shaped by two game-changing technologies: generative AI (GenAI) and the imminent…

Dracula hacking
20
Feb
2025

Darcula PhaaS can now auto-generate phishing kits for any brand

The Darcula phishing-as-a-service (PhaaS) platform is preparing to release its third major version, with one of the highlighted features, the…

alex-reinvent-2024
20
Feb
2025

How Amazon Web Services (AWS) Is Unlocking The Power Of Data

AWS customers are invited to attend a free webinar next week that will reveal strategies for maximising the value of…

Jane Devry
20
Feb
2025

AI vs. AI – How Cybercriminals Are Weaponizing Generative AI, and What Security Leaders Must Do

There is a speeding train hurtling down the tracks which is unstoppable, persistent, and accelerating faster than anyone predicted. We…

Why CIOs Need Dedicated Anti-Ransomware Solutions
20
Feb
2025

Why CIOs Need Dedicated Anti-Ransomware Solutions

CIOs responsible for safeguarding their organization’s digital infrastructure are being forced to recognize a hard truth: as ransomware tactics evolve…