Author: Cybernoz

Unlocking OSINT: Top books to learn from
17
Feb
2025

Unlocking OSINT: Top books to learn from

Discover the top Open-Source Intelligence (OSINT) books in this curated list. From investigative techniques to digital footprint analysis, these titles…

AI-driven personalisation appealing to UK shoppers, says research
17
Feb
2025

AI-driven personalisation appealing to UK shoppers, says research

Almost a third of shoppers in the UK have said that personalisation assisted by artificial intelligence (AI) increases their loyalty…

Finastra
17
Feb
2025

Fintech giant Finastra notifies victims of October data breach

Financial technology giant Finastra is notifying victims of a data breach after their personal information was stolen by unknown attackers…

Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection
17
Feb
2025

Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection

New research reveals ransomware gangs are accelerating encryption timelines while adopting advanced evasion techniques and data extortion strategies. A 2025…

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects
17
Feb
2025

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking its first update since 2022. This…

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB
17
Feb
2025

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks to credential theft…

Hackers Exploit Telegram API to Spread New Golang Backdoor
17
Feb
2025

Hackers Exploit Telegram API to Spread New Golang Backdoor

The new Golang backdoor uses Telegram for command and control. Netskope discovers malware that exploits Telegram’s API for malicious purposes….

Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely
17
Feb
2025

Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely

A sophisticated malware campaign has recently been uncovered by security researchers at Sucuri, targeting WordPress websites through hidden malware and…

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection
17
Feb
2025

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between initial system compromise and the deployment…

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
17
Feb
2025

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)

The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging…

AI models explained: The benefits of open source AI models
17
Feb
2025

AI models explained: The benefits of open source AI models

Open source software has a number of benefits over commercial products, not least the fact that it can be downloaded…

RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems
17
Feb
2025

RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems

The RansomHub ransomware group has rapidly emerged as one of the most prolific cybercrime syndicates of 2024–2025. As this ransomware…