Author: Cybernoz

Hackers Exploit Fake GitHub Repositories to Spread GitVenom Malware
25
Feb
2025

Hackers Exploit Fake GitHub Repositories to Spread GitVenom Malware

Kaspersky’s Securelist exposes the GitVenom campaign involving fake GitHub repositories to distribute malware. Targeting developers with seemingly legitimate open-source projects,…

Jane Devry
25
Feb
2025

AI is coming for your passwords – better make them strong

Weak passwords, as various studies have shown, can be cracked in a second, but now AI can crack even stronger…

Hand with data streaming through it
25
Feb
2025

US drug testing firm says data breach impacted 3.3 million people

DISA Global Solutions, a leading US background screening and drug and alcohol testing firm, has suffered a data breach impacting…

LightSpy Expanded With 100+ Commands to Attack Android, iOS, Windows, macOS & Linux Users
25
Feb
2025

LightSpy Expanded With 100+ Commands to Attack Android, iOS, Windows, macOS & Linux Users

The LightSpy advanced persistent threat (APT) group has significantly upgraded its surveillance capabilities with a 100+ command framework targeting Android,…

Malicious npm Package Targets Developers for Supply Chain Attack
25
Feb
2025

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive cryptocurrency wallet keys from developers and…

Jane Devry
25
Feb
2025

The 10 Best Email Encryption Options for Enterprises in 2025

Email encryption is an essential protection for modern businesses. The software market has adapted to this need, so leaders have…

China-based Silver Fox spoofs healthcare app to deliver malware
25
Feb
2025

China-based Silver Fox spoofs healthcare app to deliver malware

Silver Fox, a China-based threat actor that may or may not be backed by the Chinese government, has been delivering…

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site
25
Feb
2025

Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site

Cybersecurity researchers uncovered a sophisticated macOS malware campaign distributing the Poseidon Stealer through a counterfeit DeepSeek AI platform website.  This…

Jane Devry
25
Feb
2025

How healthcare cyber risk teams can plan ahead for HIPAA’s Security Rule update

Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers,…

Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign
25
Feb
2025

Attackers exploiting Cisco vulnerabilities tied to Salt Typhoon campaign

Dive Brief: GreyNoise researchers observed active exploitation of two Cisco vulnerabilities, CVE-2018-0171 and CVE-2023-20198, which reportedly have been used in recent…

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings
25
Feb
2025

INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings

INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small…

broken lock
25
Feb
2025

Background check provider data breach affects 3 million people who may not have heard of the company

Employment screening company DISA Global Solutions has filed a data breach notification after a cyber incident on their network. DISA…