Author: Cybernoz
Latrodectus, a new malware loader, has rapidly evolved since its discovery, potentially replacing IcedID. It includes a command to download…
Russian hackers launched a targeted malware campaign via Telegram, aimed at Ukrainian military recruits. Disguised as recruitment tools, the malware…
If you ever find your home appearing on Google Maps, there’s no need to panic about a potential privacy breach….
As cyber threats evolve in today’s fast-paced digital landscape, organizations face increasingly sophisticated attacks. In response, EC-Council, a global leader…
Multiple infostealer malware families have developed new techniques to circumvent Google Chrome’s Application-Bound Encryption security feature, which was introduced in…
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…
Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a vulnerability (CVE-2024-40766) in SonicWall SSL VPN…
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…
Securiti released Gencore AI, a holistic solution to easily build safe, enterprise-grade GenAI systems, copilots and AI agents. This new…
The Cybersecurity and Infrastructure Security Agency (CISA) has launched a dedicated website to provide up-to-date information on potential threats to…
A multi-stage cyberattack effort originating from malicious LNK files has been detected, with the healthcare business as the target. When…
The researcher discovered a vulnerability in the Windows Update process that allowed them to downgrade critical system components, including DLLs,…











