Author: Cybernoz

Naveen Goud
03
Feb
2025

EV Charging Stations vulnerable to cyber attacks

Electric Vehicles (EVs) are often praised for their environmental benefits and cost-effectiveness, but there are concerns about their security. According…

Malicious artificial intelligence
03
Feb
2025

DeepSeek AI tools impersonated by infostealer malware on PyPI

Threat actors are taking advantage of the rise in popularity of the DeepSeek to promote two malicious infostealer packages on the…

Jane Devry
03
Feb
2025

Strengthening Cybersecurity in an AI-Driven World: Insights and Strategies from Black Duck’s BSIMM15 Report

The cybersecurity landscape is rapidly evolving, and with mainstream adoption of artificial intelligence (AI) and more complex software supply chains,…

WhatsApp logo
03
Feb
2025

WhatsApp says Paragon is spying on specific users

WhatsApp has accused the professional spyware company Paragon of spying on a select group of users. WhatsApp, the Meta-owned, end-to-end…

Vigilant buyers are the best recipe for accountable suppliers
03
Feb
2025

Vigilant buyers are the best recipe for accountable suppliers

By Published: 03 Feb 2025 In today’s digital world, secure software is not just a feature – it’s a requirement….

Crazy Evil gang runs over 10 highly specialized social media scams
03
Feb
2025

Crazy Evil gang runs over 10 highly specialized social media scams

Crazy Evil gang runs over 10 highly specialized social media scams Pierluigi Paganini February 03, 2025 The Russian-speaking Crazy Evil…

Jane Devry
03
Feb
2025

Solving for Enterprise Cybersecurity Challenges and Risks with Secure Business Communication

In today’s digital-first era, cyber threats are a persistent and challenging reality for enterprises. According to a 2024 State of…

Disjointed industrial strategy a barrier to UK scaleup success
03
Feb
2025

Disjointed industrial strategy a barrier to UK scaleup success

The second report from the House of Lords Communications and Digital Committee has warned that the UK risks becoming an…

Hackerone logo
03
Feb
2025

DORA Compliance Is Here: What Financial Entities Should Know

What Does DORA Regulate? DORA applies to a wide range of financial entities operating in the EU, including banks, insurers,…

Government sets out cyber security practice code to stoke AI growth
03
Feb
2025

Government sets out cyber security practice code to stoke AI growth

The government has set out an artificial intelligence (AI)-focused cyber security code of practice for UK businesses, which it describes…

Jane Devry
03
Feb
2025

Out with Burnout, In with Balance: Empowering Cybersecurity Teams in 2025

In 2025, many security teams face a stark reality: they are being asked to manage increasing workloads with dwindling resources,…

Qualys TotalAppSec enables organizations to address risks across web applications and APIs
03
Feb
2025

Qualys TotalAppSec enables organizations to address risks across web applications and APIs

Qualys announced TotalAppSec, its new AI-powered application risk management solution to enable organizations to monitor and mitigate cyber risk from…