Author: Cybernoz

The New Ransomware Groups Shaking Up 2025
03
Mar
2025

The New Ransomware Groups Shaking Up 2025

In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023. After a slow start, attacks spiked in Q2…

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
03
Mar
2025

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell and legitimate Microsoft applications to…

Toronto Zoo cyberattack
03
Mar
2025

Final Update On Last Year’s Breach

The Toronto Zoo has disclosed a cyberattack that targeted the Zoo in early January 2024. The zoo has since conducted…

Serbian student activist’s phone hacked using Cellebrite zero-day exploit
03
Mar
2025

Serbian student activist’s phone hacked using Cellebrite zero-day exploit

Serbian student activist’s phone hacked using Cellebrite zero-day exploit Pierluigi Paganini March 03, 2025 Amnesty International reports that a Cellebrite…

week in security
03
Mar
2025

A week in security (February 24 – March 2)

Last week on Malwarebytes Labs: Millions of stalkerware users exposed again PayPal’s “no-code checkout” abused by scammers Countries and companies…

Cyberattack on POLSA
03
Mar
2025

Poland Investigates The Cyberattack On POLSA

The Polish officials has confirmed that the country’s cybersecurity services had detected an unauthorized breach of the Polish Space Agency’s…

Naveen Goud
03
Mar
2025

Russia not a cyber threat to the United States

In recent years, media outlets across the United States have heavily reported on the rising concerns surrounding Russia, portraying it…

How QR code attacks work and how to protect yourself
03
Mar
2025

How QR code attacks work and how to protect yourself

QR codes have become an integral part of our everyday life due to their simplicity. While they’ve been around for…

Naveen Goud
03
Mar
2025

Pros and Cons of Using AI in Cybersecurity

In today’s digital age, cybersecurity is more critical than ever before. With the increasing sophistication of cyberattacks and the expanding…

Commix: Open-source OS command injection exploitation tool
03
Mar
2025

Commix: Open-source OS command injection exploitation tool

Commix is an open-source penetration testing tool designed to automate the detection and exploitation of command injection vulnerabilities, streamlining security…

Vo1d Botnet
03
Mar
2025

Vo1d Botnet’s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries

Mar 03, 2025Ravie LakshmananMobile Security / Botnet Brazil, South Africa, Indonesia, Argentina, and Thailand have become the targets of a…

Review: The Chief AI Officer's Handbook
03
Mar
2025

Review: The Chief AI Officer’s Handbook

The Chief AI Officer’s Handbook is a comprehensive resource for professionals navigating AI implementation and strategy. It is particularly valuable…