Author: Cybernoz
HijackLoader, a malware loader first identified in 2023, has undergone significant evolution with the addition of new modules designed to…
Well, I just passed the final exam for the GIAC GSEC credential from SANS, and I have to say it’s…
Witnesses at a House hearing on medical device cybersecurity Tuesday called out the need for more proactive tracking of products…
A critical vulnerability has been identified in the Plantronics Hub software, a client application commonly used to configure Plantronics audio…
Something struck me the other day that I think most power-users with experience on both Windows and OS X would…
APT34, also known as OilRig or Helix Kitten, has intensified its cyber-espionage campaigns, deploying custom malware to target entities within…
There are many views on what constitutes a Vulnerability Assessment versus a Penetration Test. The main distinction, however, seems to…
Cybersecurity experts at eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to…
In the competitive world where artificial intelligence (AI) has made it easy to use technology, companies are constantly looking for…
Originally from Mike Gancarz’s book, here are the 9 primary tenets of Unix. Small is Beautiful Make Each Program Do…
As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of…
Data protection is of the highest importance in 2025. With growing numbers of organizations handling sensitive customer data and stricter…











