Author: Cybernoz

Apple encryption legal challenge heard behind closed doors despite calls for public hearing
14
Mar
2025

Apple encryption legal challenge heard behind closed doors despite calls for public hearing

The Investigatory Powers Tribunal (IPT) has held a day-long secret hearing into an appeal brought by Apple against a government…

alleged LockBit ransomware developer arrested extradited
14
Mar
2025

Alleged LockBit Ransomware Developer Extradited To U.S.

The U.S. has succeeded in extraditing a suspected LockBit ransomware developer who was arrested last year. Rostislav Panev, 51, a…

mobile device management
14
Mar
2025

California’s legal push on geolocation data collection must take aim at the right targets, privacy experts say

The attorney general for California announced this week a wide-ranging investigation into the way companies collect, process and use consumer…

Tech giants seek data standards amid AI push
14
Mar
2025

Tech giants seek data standards amid AI push

Dive Brief: Five technology vendors united behind adoption of cross-industry data safety standards Thursday. Cisco, IBM, Intel, Microsoft and Red…

Cisco
14
Mar
2025

Cisco IOS XR vulnerability lets attackers crash BGP on routers

Cisco has patched a denial of service (DoS) vulnerability that lets attackers crash the Border Gateway Protocol (BGP) process on IOS XR routers…

New Context Compliance Attack Jailbreaks Most of The Major AI Models
14
Mar
2025

New Context Compliance Attack Jailbreaks Most of The Major AI Models

A new, surprisingly simple method called Context Compliance Attack (CCA) has proven effective at bypassing safety guardrails in most leading…

SuperBlack ransomware strain used in attacks targeting Fortinet vulnerabilities
14
Mar
2025

SuperBlack ransomware used to exploit Fortinet vulnerabilities

Dive Brief: A newly discovered ransomware strain, tracked as SuperBlack, has been used in a series of attacks targeting critical…

Pew Pew Map of the World
14
Mar
2025

Ransomware gang creates tool to automate VPN brute-force attacks

The Black Basta ransomware operation created an automated brute-forcing framework dubbed ‘BRUTED’ to breach edge networking devices like firewalls and…

Israeli LockBit Developer Rostislav Panev
14
Mar
2025

Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

Mar 14, 2025Ravie LakshmananCybercrime / Ransomware A 51-year-old dual Russian and Israeli national who is alleged to be a developer…

SuperBlack ransomware strain used in attacks targeting Fortinet vulnerabilities
14
Mar
2025

SuperBlack ransomware strain used in attacks targeting Fortinet vulnerabilities

Dive Brief: A newly discovered ransomware strain, tracked as SuperBlack, has been used in a series of attacks targeting critical…

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers
14
Mar
2025

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting both Windows and Linux systems. The…

Research on iOS apps shows widespread exposure of secrets
14
Mar
2025

Research on iOS apps shows widespread exposure of secrets

Researchers found that most of the apps available on Apple’s App Store leak at least one hard-coded secret. The researchers…