Author: Cybernoz

Specops VPN shield
04
Feb
2025

How hackers target your Active Directory with breached VPN passwords

As the gateways to corporate networks, VPNs are an attractive target for attackers seeking access to Active Directory environments. And…

Hackers Using HTTP Client Tools To Takeover Microsoft 365 Accounts
04
Feb
2025

Hackers Using HTTP Client Tools To Takeover Microsoft 365 Accounts

Hackers have increasingly been using HTTP client tools to orchestrate sophisticated account takeover attacks on Microsoft 365 environments. A staggering…

Apache Cassandra Vulnerability Allows Attackers to Gain Access Data Centers
04
Feb
2025

Apache Cassandra Vulnerability Allows Attackers to Gain Access Data Centers

In a recent security advisory, a moderate-severity vulnerability has been identified in Apache Cassandra, potentially allowing unauthorized users to access…

Stock market
04
Feb
2025

California man steals $50 million using fake investment sites, gets 7 years

A 59-year-old man from Irvine, California, was sentenced to 87 months in prison for his involvement in an investor fraud…

Researchers Uncovers New Methods To Defend AI Models Against Universal Jailbreaks
04
Feb
2025

Researchers Uncovers New Methods To Defend AI Models Against Universal Jailbreaks

Researchers from the Anthropic Safeguards Research Team have developed a new approach to protect AI models from universal jailbreaks. This…

ANY.RUN Enhances Malware Detection and Performance to Combat 2025 Cyber Threats
04
Feb
2025

ANY.RUN Enhances Malware Detection and Performance to Combat 2025 Cyber Threats

As cyber threats grow more sophisticated, ANY.RUN has unveiled a series of updates aimed at improving malware detection, analysis, and…

Can AI identify financially vulnerable people better than humans?
04
Feb
2025

Can AI identify financially vulnerable people better than humans?

Some 35 million adults in the UK are financially vulnerable, according to FCA criteria. And 37% of financially vulnerable consumers…

Critical Windows OLE Zero-Click Vulnerability Let Attacker to Execute Arbitrary Code
04
Feb
2025

Critical Windows OLE Zero-Click Vulnerability Let Attacker to Execute Arbitrary Code

A critical security flaw, identified as CVE-2025-21298, has been disclosed in Microsoft’s Windows Object Linking and Embedding (OLE) technology.  This…

SpyCloud Leads the Way in Comprehensive Identity Threat Protection
04
Feb
2025

SpyCloud Leads the Way in Comprehensive Identity Threat Protection

SpyCloud, a leading identity threat protection company, has unveiled key innovations in its portfolio, driving a shift towards holistic identity…

The Reputational Impact Of Cyberattacks Can Outlast All Other Consequences
04
Feb
2025

The Reputational Impact Of Cyberattacks Can Outlast All Other Consequences

Cybercrime is among the most significant threats to modern businesses—no matter the size of the company or its sector. With…

Fake Job Interviews on macOS
04
Feb
2025

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

Feb 04, 2025Ravie LakshmananMalware / Cryptocurrency The North Korean threat actors behind the Contagious Interview campaign have been observed delivering…

“Unsafe At Any Speed”. Comparing automobiles to code risk
04
Feb
2025

“Unsafe At Any Speed”. Comparing automobiles to code risk

Outgoing CISA chief Jen Easterly recently compared secure software development to automotive safety, arguing that we were at an inflection…