Author: Cybernoz

5 Ways to hack WordPress targets
13
Feb
2025

5 Ways to hack WordPress targets

Over half a billion websites are powered by WordPress as of today. Unfortunately, not every instance deserves the same security…

Chinese espionage tools deployed in RA World ransomware attack
13
Feb
2025

Chinese espionage tools deployed in RA World ransomware attack

A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a ransomware…

RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape
13
Feb
2025

RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape

Introduction The mobile application landscape is more dynamic and challenging than ever, with businesses increasingly relying on mobile channels to…

Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts
13
Feb
2025

Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts

New Astaroth Phishing Kit bypasses 2FA (two-factor authentication) to steal Gmail, Yahoo and Microsoft login credentials using a reverse proxy,…

Palo Alto Networks Cortex Cloud applies AI-driven insights to reduce risk and prevent threats
13
Feb
2025

Palo Alto Networks Cortex Cloud applies AI-driven insights to reduce risk and prevent threats

Palo Alto Networks introduced Cortex Cloud, the next version of Prisma Cloud, that natively brings together new releases of its…

South Korea Cyberattacks
13
Feb
2025

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

Feb 13, 2025Ravie LakshmananUnited States A nation-state threat actor with ties to North Korea has been linked to an ongoing…

Training Employees To Defend Against Ransomware
13
Feb
2025

Training Employees To Defend Against Ransomware

13 Feb Training Employees To Defend Against Ransomware Posted at 08:50h in Blogs by Taylor Fox This week in cybersecurity…

Sandworm APT's initial access subgroup hits organizations accross the globe
13
Feb
2025

Sandworm APT’s initial access subgroup hits organizations accross the globe

A subgroup of Russia’s Sandworm APT has been working to achieve initial and persistent access to the IT networks of…

AI and Security
13
Feb
2025

AI and Security – A New Puzzle to Figure Out

AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of…

Russia-linked APT Seashell Blizzard is behind the long-running global access operation BadPilot campaign
13
Feb
2025

Russia-linked APT Seashell Blizzard is behind the long-running global access operation BadPilot campaign

Russia-linked APT Seashell Blizzard is behind the long running global access operation BadPilot campaign Pierluigi Paganini February 13, 2025 A…

Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture
13
Feb
2025

Deciphering End User Data Access Patterns is Key to a Strong SaaS Security Posture

It’s all about patterns. Long before cybersecurity was on anyone’s radar, defensive intelligence – like catching an enemy spy in…

FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now!
13
Feb
2025

FortiOS Vulnerability Allows Super-Admin Privilege Escalation

Super-admin access vulnerability discovered in FortiOS Security Fabric. Exploitation could lead to widespread network breaches. Update now. Fortinet has released a…