Author: Cybernoz

Security-Focused Brokers Underwrite Better Cyberinsurance Policies
23
Apr
2025

Security-Focused Brokers Underwrite Better Cyberinsurance Policies

As ransomware, social engineering, and AI-driven deception reshape the threat landscape, cyberinsurance brokers are under pressure to deliver more than…

Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs
23
Apr
2025

Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs

MITRE has released the latest version of its ATT&CK framework, which now also includes a new section (“matrix”) to cover…

Android Spyware
23
Apr
2025

Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

Apr 23, 2025Ravie LakshmananSpyware / Mobile Security Cybersecurity researchers have revealed that Russian military personnel are the target of a…

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers
23
Apr
2025

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could allow attackers to silently drain…

Ransomware Surge Hits US Healthcare: AOA, DaVita and Bell Ambulance Breached
23
Apr
2025

AOA, DaVita and Bell Ambulance Breached

AOA, DaVita, and Bell Ambulance hit by ransomware in 2025. Over 245K affected as hackers steal patient data, demand ransoms,…

2025 Data Breach Investigations Report: Third-party breaches double
23
Apr
2025

2025 Data Breach Investigations Report: Third-party breaches double

The exploitation of vulnerabilities has seen another year of growth as an initial access vector for breaches, reaching 20%, according…

Russian Hackers Exploit Microsoft OAuth
23
Apr
2025

Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an…

Amid uncertainty, Armis becomes newest CVE numbering authority
23
Apr
2025

Amid uncertainty, Armis becomes newest CVE numbering authority

Mitre’s Common Vulnerabilities and Exposures (CVE) Program – which last week came close to shutting down altogether amid a wide-ranging…

New Malware Hijacks Docker Images Using Unique Obfuscation Technique
23
Apr
2025

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according to Darktrace’s honeypot data, has…

Three Reasons Why the Browser is Best for Stopping Phishing Attacks
23
Apr
2025

Three Reasons Why the Browser is Best for Stopping Phishing Attacks

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software…

Hitachi Vantara: VSP One leads revamped storage portfolio
23
Apr
2025

Hitachi Vantara: VSP One leads revamped storage portfolio

In this storage supplier profile, we look at Hitachi Vantara, which is a small part of a very big organisation….

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials
23
Apr
2025

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users with malicious Word documents designed to…