Author: Cybernoz

Cryptocurrency falling
04
Feb
2025

Google Play, Apple App Store apps caught stealing crypto wallets

Android and iOS apps on the Google Play Store and Apple App Store contain a malicious software development kit (SDK)…

Medibank CISO out following restructure
04
Feb
2025

Medibank CISO out following restructure – Security

Medibank’s chief information security officer of three years Alex Loizou has emerged as a high-profile casualty of a restructure of…

Hacker
04
Feb
2025

Cyber agencies share security guidance for network edge devices

Five Eyes cybersecurity agencies in the UK, Australia, Canada, New Zealand, and the U.S. have issued guidance urging makers of…

GrubHub Data Breach - Customers Phone Numbers Exposed 
04
Feb
2025

GrubHub Data Breach – Customers Phone Numbers Exposed 

The popular food delivery platform Grubhub has disclosed a significant data breach involving unauthorized access to customer, merchant, and driver…

Panda
04
Feb
2025

Chinese cyberspies use new SSH backdoor in network device hacks

A Chinese hacking group is hijacking the SSH daemon on network appliances by injecting malware into the process for persistent…

3 SOC Challenges Solved by Threat Intelligence
04
Feb
2025

3 SOC Challenges Solved by Threat Intelligence

An organization’s cyber security operation center (SOC) is a unit in charge of cyber threat prevention and mitigation.  Within this…

Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’? – Krebs on Security
04
Feb
2025

Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’? – Krebs on Security

The FBI joined authorities across Europe last week in seizing domain names for Cracked and Nulled, English-language cybercrime forums with…

Cybercriminals Exploiting HTTP Client Tools to Hijack Microsoft 365 Accounts
04
Feb
2025

Cybercriminals Exploiting HTTP Client Tools to Hijack Microsoft 365 Accounts

A recent report by Proofpoint has revealed an alarming trend of cybercriminals exploiting HTTP client tools to target Microsoft 365…

Jane Devry
04
Feb
2025

Insider Threat Program Modernization: Trends, Technologies, and Whole-Person Risk Assessment

Insider threat management remains a top priority for organizations as insider incidents rise. Insider threats encompass a broad spectrum of…

Quantum datacentre deployments: How they are supporting evolving compute projects
04
Feb
2025

Quantum datacentre deployments: How they are supporting evolving compute projects

Put lots of qubits together and you have quantum computing, requiring datacentres that can support it. A quantum datacentre though…

7-Zip
04
Feb
2025

7-Zip MotW bypass exploited in zero-day attacks against Ukraine

A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by Russian…

New Tiny FUD Attacking macOS Users Bypassing Antivirus and Security Tools
04
Feb
2025

New Tiny FUD Attacking macOS Users Bypassing Antivirus and Security Tools

A new, highly sophisticated malware known as Tiny FUD has been identified, targeting macOS users with advanced evasion techniques that…