Author: Cybernoz

My Current Thoughts on Israel
22
Apr
2025

My Current Thoughts on Israel

My thinking on Israel has changed a lot over the years. I’ve spent a few weeks there while in my…

Zscaler Identifies New Mustang Panda Cyber Activity
22
Apr
2025

Zscaler Identifies New Mustang Panda Cyber Activity

Following a recent US-led court-authorised operation that removed malware from over 4,200 infected networks, new activity has emerged from the…

New Phishing Attack Appending Weaponized HTML Files Inside SVG Files
22
Apr
2025

New Phishing Attack Appending Weaponized HTML Files Inside SVG Files

Cybersecurity experts have identified a sophisticated new phishing technique that exploits the SVG (Scalable Vector Graphics) file format to deliver…

The Principle of Many Truths
22
Apr
2025

The Principle of Many Truths

I’ve been thinking recently about a concept I call “The Principle of Many Truths”. It’s a way of explaining why…

North Korean IT Workers Using Real-time Deepfake to Infiltrate Organizations via Remote Job
22
Apr
2025

North Korean IT Workers Using Real-time Deepfake to Infiltrate Organizations via Remote Job

In a concerning evolution of cyber infiltration tactics, North Korean IT workers have begun deploying sophisticated real-time deepfake technology during…

Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models
22
Apr
2025

Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed “VibeScamming,” where cybercriminals are using AI tools to…

Using jk vs. jj for ESC Remapping in Vim by Steve Losh
22
Apr
2025

Using jk vs. jj for ESC Remapping in Vim by Steve Losh

Some people prefer using jj instead of jk, but I prefer jk for two reasons: jk is typed with two…

Attack Via Infostealers Increased by 84% Via Phishing Emails Per Week
22
Apr
2025

Attack Via Infostealers Increased by 84% Via Phishing Emails Per Week

Cybersecurity researchers have documented an alarming surge in infostealer malware distribution through phishing channels, with weekly delivery volume increasing by…

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations
22
Apr
2025

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates…

Being Smart in the 21st Century
21
Apr
2025

Being Smart in the 21st Century

I think many are confused about what it means to be smart today. I hear people speaking often about others…

Key Practices For Security Leaders
21
Apr
2025

Key Practices For Security Leaders

In today’s cybersecurity landscape, organizations face increasingly sophisticated attacks from adversaries ranging from opportunistic hackers to state-sponsored threat actors. With…

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools
21
Apr
2025

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools

The Akira ransomware group has intensified its operations, targeting over 350 organizations and claiming approximately $42 million USD in ransom…