Author: Cybernoz

Jane Devry
13
Dec
2024

How AI will both threaten and protect data in 2025

As we move into 2025, generative AI and other emerging technologies are reshaping how businesses operate, while at the same…

FBI Busts Rydox Marketplace
13
Dec
2024

FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized

The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox (“rydox.ru” and “rydox[.]cc”)…

Securing the Hybrid Era: How to Protect Your Expanding Attack Surface
13
Dec
2024

Securing the Hybrid Era: How to Protect Your Expanding Attack Surface – Partner Content

As businesses rapidly adopt hybrid infrastructures, they’re reaping the rewards of flexibility, scalability, and innovation. However, these benefits come at…

CISA Cyber Resiliency Toolkit Update For Public Safety
13
Dec
2024

CISA Cyber Resiliency Toolkit Update For Public Safety

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Public Safety Communications and Cyber Resiliency Toolkit with the release…

Naveen Goud
13
Dec
2024

Operation Power Off: International Effort Targets DDoS-for-Hire Networks

A global crackdown, known as Operation Power Off, has successfully disrupted over 27 major platforms that were facilitating Distributed Denial…

CISOs need to consider the personal risks associated with their role
13
Dec
2024

CISOs need to consider the personal risks associated with their role

70% of cybersecurity leaders felt that stories of CISOs being held personally liable for cybersecurity incidents have negatively affected their…

FuzzyAI: Open-source tool for automated LLM fuzzing
13
Dec
2024

FuzzyAI: Open-source tool for automated LLM fuzzing

FuzzyAI is an open-source framework that helps organizations identify and address AI model vulnerabilities in cloud-hosted and in-house AI models,…

Citrix NetScaler Devices Under Attack
13
Dec
2024

Citrix NetScaler Devices Under Attack, Brute-force Attacks Exploiting Zero-days

A significant surge in brute-force attacks targeting Citrix NetScaler devices across multiple organizations. The attacks, primarily originating from a Hong…

Tackling software vulnerabilities with smarter developer strategies
13
Dec
2024

Tackling software vulnerabilities with smarter developer strategies

In this Help Net Security interview, Karl Mattson, CISO at Endor Labs, discusses strategies for enhancing secure software development. Mattson…

New infosec products of the week: December 13, 2024
13
Dec
2024

New infosec products of the week: December 13, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Horizon3.ai, SecureAuth, Stamus…

14 North Korean IT Workers Charged
13
Dec
2024

14 North Korean IT Workers Charged, US to Offer $5 Million Rewards for Info

A federal court in St. Louis, Missouri, has indicted 14 North Korean nationals in a sophisticated scheme involving IT workers…

US Bitcoin ATM operator Byte Federal suffered a data breach
13
Dec
2024

US Bitcoin ATM operator Byte Federal suffered a data breach

US Bitcoin ATM operator Byte Federal suffered a data breach Pierluigi Paganini December 12, 2024 US Bitcoin ATM operator Byte…