Author: Cybernoz

Nominet
13
Jan
2025

UK domain registry Nominet confirms breach via Ivanti zero-day

Nominet, the official .UK domain registry and one of the largest country code registries, has confirmed that its network was…

CISA Releases A New Free Guide For OT Products Security
13
Jan
2025

CISA Releases A New Free Guide For OT Products Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has launched a new guidance document to enhance cybersecurity for operational technology…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
13
Jan
2025

The new rules for AI and encrypted messaging, with Mallory Knodel (Lock and Code S06E01)

This week on the Lock and Code podcast… The era of artificial intelligence everything is here, and with it, come…

AI is meant to free up time and yet somehow… It's stealing it
13
Jan
2025

AI is meant to free up time and yet somehow… It’s stealing it

Freedom. It’s the word that sparked a revolution of technological innovation, a promise embedded in every breakthrough, especially artificial intelligence…

Hand holding a key
13
Jan
2025

Ransomware abuses Amazon AWS feature to encrypt S3 buckets

A new ransomware campaign encrypts Amazon S3 buckets using AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) known only to…

Naveen Goud
13
Jan
2025

Ransomware attack on Amazon and Dutch University

Amazon Storage Buckets Targeted by Codefinger Ransomware Amazon Web Services (AWS), often considered one of the most secure cloud storage…

Can the UK government achieve its artificial intelligence ambitions?
13
Jan
2025

Can the UK government achieve its artificial intelligence ambitions?

The Labour government’s 50-step artificial intelligence (AI) plan sets out a series of measures to develop the UK as a…

Data Decay and Cybersecurity: Understanding The Risks And Mitigating The Impact On Your Business
13
Jan
2025

Data Decay and Cybersecurity: Understanding The Risks And Mitigating The Impact On Your Business

Becoming successful in this digital age means your business operations, decision-making, and customer relationships are primarily powered by your data….

smishing iMessage
13
Jan
2025

iMessage text gets recipient to disable phishing protection so they can be phished

A smishing (SMS phishing) campaign is targeting iMessage users, attempting to socially engineer them into bypassing Apple’s built in phishing…

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners
13
Jan
2025

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

Jan 13, 2025Ravie LakshmananVulnerability / Cloud Security A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform…

13
Jan
2025

EU law enforcement training agency data breach: Data of 97,000 individuals compromised

Personal data of nearly 100,000 individuals that have participated in trainings organized by CEPOL, the European Union (EU) Agency for…

Attackers Allegedly Steal 2.3 GB Of Internal Data
13
Jan
2025

Attackers Allegedly Steal 2.3 GB Of Internal Data

Spanish telecommunications giant Telefonica has confirmed a significant breach of its internal systems, with attackers claiming to have stolen approximately…