Author: Cybernoz

HijackLoader Evolves with New Modules for Stealth and Malware Analysis Evasion
02
Apr
2025

HijackLoader Evolves with New Modules for Stealth and Malware Analysis Evasion

HijackLoader, a malware loader first identified in 2023, has undergone significant evolution with the addition of new modules designed to…

The Infosec Trinity | Daniel Miessler
02
Apr
2025

The Infosec Trinity | Daniel Miessler

Well, I just passed the final exam for the GIAC GSEC credential from SANS, and I have to say it’s…

ransomware healthcare
02
Apr
2025

Dispersed responsibility, lack of asset inventory is causing gaps in medical device cybersecurity

Witnesses at a House hearing on medical device cybersecurity Tuesday called out the need for more proactive tracking of products…

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges
02
Apr
2025

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges

A critical vulnerability has been identified in the Plantronics Hub software, a client application commonly used to configure Plantronics audio…

OS X vs. Windows: One Observation
02
Apr
2025

OS X vs. Windows: One Observation

Something struck me the other day that I think most power-users with experience on both Windows and OS X would…

APT34 Deploys Custom Malware Targeting Finance and Telecom Sectors
02
Apr
2025

APT34 Deploys Custom Malware Targeting Finance and Telecom Sectors

APT34, also known as OilRig or Helix Kitten, has intensified its cyber-espionage campaigns, deploying custom malware to target entities within…

The Difference Between a Vulnerability Assessment and a Penetration Test
02
Apr
2025

The Difference Between a Vulnerability Assessment and a Penetration Test

There are many views on what constitutes a Vulnerability Assessment versus a Penetration Test. The main distinction, however, seems to…

KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads
02
Apr
2025

KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads

Cybersecurity experts at eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to…

Enhancing Customer Engagement with Outsourced Telemarketing 
02
Apr
2025

Enhancing Customer Engagement with Outsourced Telemarketing 

In the competitive world where artificial intelligence (AI) has made it easy to use technology, companies are constantly looking for…

The Unix Philosophy | Daniel Miessler
02
Apr
2025

The Unix Philosophy | Daniel Miessler

Originally from Mike Gancarz’s book, here are the 9 primary tenets of Unix. Small is Beautiful Make Each Program Do…

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices
02
Apr
2025

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of…

Best Data Anonymization Tools in 2025
02
Apr
2025

Best Data Anonymization Tools in 2025

Data protection is of the highest importance in 2025. With growing numbers of organizations handling sensitive customer data and stricter…