Author: Cybernoz

BeyondTrust Privileged Remote Access Vulnerability Actively Exploited in the Wild
13
Jan
2025

BeyondTrust Privileged Remote Access Vulnerability Actively Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical OS command injection vulnerability (CVE-2024-12686) found in BeyondTrust’s Privileged…

Experts say ‘something has to break’ before banks slow IT-driven cost-cutting measures
13
Jan
2025

Experts say ‘something has to break’ before banks slow IT-driven cost-cutting measures

Two separate announcements have highlighted the aggressive cost-cutting measures banks are putting in place as digital technologies replace thousands of…

Security Update: Ivanti Connect Secure (CVE-2025-0282)
13
Jan
2025

Security Update: Ivanti Connect Secure (CVE-2025-0282)

A critical vulnerability (CVE-2025-0282) has been identified in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This vulnerability could allow…

CISA Launched A Free Guide to Enhance OT Products Security
13
Jan
2025

CISA Launched A Free Guide to Enhance OT Products Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new…

CNI operators should ask these 12 questions of their OT suppliers
13
Jan
2025

CNI operators should ask these 12 questions of their OT suppliers

The UK’s National Cyber Security Centre (NCSC) has joined forces with its Five Eyes partners and other agencies from the…

Nominet
13
Jan
2025

UK domain registry Nominet confirms breach via Ivanti zero-day

Nominet, the official .UK domain registry and one of the largest country code registries, has confirmed that its network was…

CISA Releases A New Free Guide For OT Products Security
13
Jan
2025

CISA Releases A New Free Guide For OT Products Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has launched a new guidance document to enhance cybersecurity for operational technology…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
13
Jan
2025

The new rules for AI and encrypted messaging, with Mallory Knodel (Lock and Code S06E01)

This week on the Lock and Code podcast… The era of artificial intelligence everything is here, and with it, come…

AI is meant to free up time and yet somehow… It's stealing it
13
Jan
2025

AI is meant to free up time and yet somehow… It’s stealing it

Freedom. It’s the word that sparked a revolution of technological innovation, a promise embedded in every breakthrough, especially artificial intelligence…

Hand holding a key
13
Jan
2025

Ransomware abuses Amazon AWS feature to encrypt S3 buckets

A new ransomware campaign encrypts Amazon S3 buckets using AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) known only to…

Naveen Goud
13
Jan
2025

Ransomware attack on Amazon and Dutch University

Amazon Storage Buckets Targeted by Codefinger Ransomware Amazon Web Services (AWS), often considered one of the most secure cloud storage…

Can the UK government achieve its artificial intelligence ambitions?
13
Jan
2025

Can the UK government achieve its artificial intelligence ambitions?

The Labour government’s 50-step artificial intelligence (AI) plan sets out a series of measures to develop the UK as a…