Author: Cybernoz

APT37 Hackers Abusing Group Chats To Attack Via Malicious LNK File
03
Feb
2025

APT37 Hackers Abusing Group Chats To Attack Via Malicious LNK File

The North Korean state-sponsored hacking group APT37 (aka ScarCruft, Reaper), has been identified leveraging group chat platforms to distribute malicious…

DeepSeek-R1 more readily generates dangerous content than other large language models
03
Feb
2025

DeepSeek-R1 more readily generates dangerous content than other large language models

DeepSeek, the rapidly growing generative artificial intelligence (GenAI) model that made waves around the world at the end of January…

Threat Replay Testing: Turning Attackers into Pen Testers
03
Feb
2025

Threat Replay Testing: Turning Attackers into Pen Testers

In war, as Sun Tzu taught us, the better you understand your enemy’s tactics (and yourself), the better equipped you…

Linux 6.14 Released - 500,000 Lines of Code Modified
03
Feb
2025

Linux 6.14 Released – 500,000 Lines of Code Modified

Linus Torvalds, the creator of the Linux kernel, has announced the release of Linux 6.14-rc1, marking the end of the…

Forrester: Why digitisation needs strong data engineering skills
03
Feb
2025

Forrester: Why digitisation needs strong data engineering skills

Data and analytics leaders must build and address the adaptive and resilient data-driven business strategy and roadmap by improving the…

Parrot 6.3 Released With Improved Security & New Hacking Tools
03
Feb
2025

Parrot 6.3 Released With Improved Security & New Hacking Tools

ParrotOS, the cybersecurity-focused Linux distribution, has recently released its latest update, Parrot 6.3, which includes a number of new features,…

week in security
03
Feb
2025

A week in security (January 27 – February 2)

Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! Our business solutions remove all remnants of ransomware and…

HeartSender
03
Feb
2025

Justice Department Seizes HeartSender Cybercrime Websites

The Justice Department made a new move in disrupting an international network of cybercriminals by announcing the coordinated seizure of…

BeyondTrust Zero-Day Breach - 17 SaaS Customers API Key Compromised
03
Feb
2025

BeyondTrust Zero-Day Breach – 17 SaaS Customers API Key Compromised

BeyondTrust, a leading identity and access management firm, disclosed a critical security breach impacting 17 customers of its Remote Support…

Texas is the first state to ban DeepSeek on government devices
03
Feb
2025

Texas is the first state to ban DeepSeek on government devices

Texas is the first state to ban DeepSeek on government devices Pierluigi Paganini February 03, 2025 Texas bans DeepSeek and…

Traff - New Malicious Bulk SMS Portal That Fuels Phishing Attacks
03
Feb
2025

Traff – New Malicious Bulk SMS Portal That Fuels Phishing Attacks

A new threat to cybersecurity has emerged in the form of Devil-Traff, a bulk SMS platform designed to facilitate large-scale…

5 Best Scan Infrastructure as Code (IaC) Scanning Tools in 2025
03
Feb
2025

5 Best Scan Infrastructure as Code (IaC) Scanning Tools in 2025

As organizations increasingly adopt Infrastructure as Code (IaC) to automate and manage their cloud environments, ensuring the security of these…