Author: Cybernoz

BlackLock ransomware onslaught: What to expect and how to fight it
18
Feb
2025

BlackLock ransomware onslaught: What to expect and how to fight it

BlackLock is on track to become the most active ransomware-as-a-service (RaaS) outfit in 2025, according to ReliaQuest. Its success is…

Pentera - Key inserted into lock
18
Feb
2025

Why a Checklist Won’t Stop Cyberattacks

By Autumn Stambaugh, Senior Sales Engineer at Pentera Think you’re safe because you’re compliant? Think again. Recent studies continue to…

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions
18
Feb
2025

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

A sophisticated malware campaign leveraging the Lumma InfoStealer has been identified, targeting educational institutions to distribute malicious files disguised as…

Naveen Goud
18
Feb
2025

The Rising Threat of Cybercrime: The Emergence of “Fraud-As-A-Service” (FaaS)

In recent years, cyber crime has evolved into a highly sophisticated and organized business model. One of the most alarming…

Evade Detection in Targeted Cyber Attacks
18
Feb
2025

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

Feb 18, 2025Ravie LakshmananCyber Espionage / Malware The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing…

EY: Industrial companies worldwide stunted in emerging technology use
18
Feb
2025

EY: Industrial companies worldwide stunted in emerging technology use

Many companies from a range of industries worldwide are stuck at a trial stage of emerging technologies usage, according to…

New Variant of XCSSET Malware Targets macOS Notes and Wallets
18
Feb
2025

New Variant of XCSSET Malware Targets macOS Notes and Wallets

Microsoft warns Apple developers about a new XCSSET malware variant targeting macOS, posing security risks through stealthy infections and data…

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions
18
Feb
2025

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions

Intel by Intruder now uses AI to contextualize NVD descriptions, helping security teams assess risk faster. Intruder, a leader in…

cybernewswire
18
Feb
2025

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions

Intel by Intruder now uses AI to contextualize NVD descriptions, helping security teams assess risk faster. Intruder, a leader in…

cybernewswire
18
Feb
2025

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions

Intel by Intruder now uses AI to contextualize NVD descriptions, helping security teams assess risk faster. Intruder, a leader in…

5 Ways Companies Safeguard Their Crown Jewels Of Data
18
Feb
2025

5 Ways Companies Safeguard Their Crown Jewels Of Data

Data loss is becoming a bigger danger for businesses, both financially and numerically. According to an IBM report, the average data…

Malware Targets macOS Users
18
Feb
2025

New FrigidStealer Malware Targets macOS Users via Fake Browser Updates

Feb 18, 2025Ravie LakshmananThreat Intelligence / Malware Cybersecurity researchers are alerting to a new campaign that leverages web injects to…