Author: Cybernoz

Latrodectus Employs New anti-Debugging And Sandbox Evasion Techniques
29
Oct
2024

Latrodectus Employs New anti-Debugging And Sandbox Evasion Techniques

Latrodectus, a new malware loader, has rapidly evolved since its discovery, potentially replacing IcedID. It includes a command to download…

Russian Malware Attack Targets Ukrainian Military Recruits via Telegram
29
Oct
2024

Russian Malware Attack Targets Ukrainian Military Recruits via Telegram

Russian hackers launched a targeted malware campaign via Telegram, aimed at Ukrainian military recruits. Disguised as recruitment tools, the malware…

Naveen Goud
29
Oct
2024

Navigating Privacy Concerns on Google Maps: Understanding the Blurring Feature

If you ever find your home appearing on Google Maps, there’s no need to panic about a potential privacy breach….

EC-Council Unveils AI-Powered CEH V13
29
Oct
2024

EC-Council Unveils AI-Powered CEH V13

As cyber threats evolve in today’s fast-paced digital landscape, organizations face increasingly sophisticated attacks. In response, EC-Council, a global leader…

Infostealer Malwares Bypassing Chrome’s Cookie Protection to Steal Data
29
Oct
2024

Infostealer Malwares Bypassing Chrome’s Cookie Protection to Steal Data

Multiple infostealer malware families have developed new techniques to circumvent Google Chrome’s Application-Bound Encryption security feature, which was introduced in…

How a CISO Should Brief the Board of Directors
29
Oct
2024

How a CISO Should Brief the Board of Directors

It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply…

Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks
29
Oct
2024

Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks

Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a vulnerability (CVE-2024-40766) in SonicWall SSL VPN…

Building Resilience: A Post-Breach Security Strategy for Any Organization
29
Oct
2024

Building Resilience: A Post-Breach Security Strategy for Any Organization

In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to…

Securiti Gencore AI accelerates GenAI adoption in the enterprise
29
Oct
2024

Securiti Gencore AI accelerates GenAI adoption in the enterprise

Securiti released Gencore AI, a holistic solution to easily build safe, enterprise-grade GenAI systems, copilots and AI agents. This new…

US 2024 Elections Security Boosted By CISA’s New Site
29
Oct
2024

US 2024 Elections Security Boosted By CISA’s New Site

The Cybersecurity and Infrastructure Security Agency (CISA) has launched a dedicated website to provide up-to-date information on potential threats to…

Hackers Downgrading Remote Desktop Security Setting For Unauthorized Access
29
Oct
2024

Hackers Downgrading Remote Desktop Security Setting For Unauthorized Access

A multi-stage cyberattack effort originating from malicious LNK files has been detected, with the healthcare business as the target. When…

New Windows Downgrade Attack Let Hackers Downgrade Patched Systems To Exploits
29
Oct
2024

New Windows Downgrade Attack Let Hackers Downgrade Patched Systems To Exploits

The researcher discovered a vulnerability in the Windows Update process that allowed them to downgrade critical system components, including DLLs,…