Author: Cybernoz

Mitigating Insider Threats - A CISO's Practical Approach
30
Apr
2025

Mitigating Insider Threats – A CISO’s Practical Approach

Insider threats represent one of the most challenging cybersecurity risks facing organizations today, with incidents on the rise and costs…

The CISO’s Guide to Effective Cloud Security Strategies
30
Apr
2025

The CISO’s Guide to Effective Cloud Security Strategies

As organizations accelerate cloud adoption, CISOs face unprecedented challenges securing dynamic, multi-cloud environments. The shift to cloud-native architectures, hybrid workloads,…

How threat groups and hackers are using GenAI
30
Apr
2025

Threat Groups Use GenAI To Refine Attack Techniques: RSAC

Nation-state threat actors are using generative AI tools to refine their attack techniques, but they aren’t yet using GenAI to…

FBI
30
Apr
2025

FBI shares massive list of 42,000 LabHost phishing domains

The FBI has shared 42,000 phishing domains tied to the LabHost cybercrime platform, one of the largest global phishing-as-a-service (PhaaS)…

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams
30
Apr
2025

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams

Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat actors in investment scams, which, according…

Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks
30
Apr
2025

Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks

Apr 30, 2025Ravie LakshmananThreat Intelligence / Malware Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous…

SonicWall
30
Apr
2025

SMA100 VPN vulnerabilities now exploited in attacks

​Cybersecurity company SonicWall has warned customers that several vulnerabilities impacting its Secure Mobile Access (SMA) appliances are now being actively…

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens
30
Apr
2025

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace’s Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been exploiting legitimate Software-as-a-Service (SaaS) platforms like…

From TV5Monde to Govt: France Blames Russia’s APT28 for Cyberattacks
30
Apr
2025

France Blames Russia’s APT28 for Cyberattacks

France accuses Russia’s APT28 hacking group (Fancy Bear) of targeting French government entities in a cyber espionage campaign. Learn about…

Critical MCP and A2A Flaws
30
Apr
2025

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

Apr 30, 2025Ravie LakshmananArtificial Intelligence / Email Security As the field of artificial intelligence (AI) continues to evolve at a…

Government funds training to build UK chip skills
30
Apr
2025

Government funds training to build UK chip skills

To tie in with funding for the UK’s semiconductor sector, Southampton has become home to an E-beam lithography facility, one…

Data center
30
Apr
2025

Commvault says recent breach didn’t impact customer backup data

Commvault, a leading provider of data protection solutions, says a nation-state threat actor who breached its Azure environment didn’t gain…