Author: Cybernoz

Mozilla Tweaks Firefox Terms After Uproar Over Data Use Language
03
Mar
2025

Mozilla Tweaks Firefox Terms After Uproar Over Data Use Language

Firefox’s new Terms of Use spark user backlash over data rights. Learn how Mozilla responded to concerns about broad language…

Exploiting Amazon IAM Permissions for Phishing Attacks
03
Mar
2025

Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in Amazon Web Services (AWS) environments…

The New Ransomware Groups Shaking Up 2025
03
Mar
2025

The New Ransomware Groups Shaking Up 2025

In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023. After a slow start, attacks spiked in Q2…

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
03
Mar
2025

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell and legitimate Microsoft applications to…

Toronto Zoo cyberattack
03
Mar
2025

Final Update On Last Year’s Breach

The Toronto Zoo has disclosed a cyberattack that targeted the Zoo in early January 2024. The zoo has since conducted…

Serbian student activist’s phone hacked using Cellebrite zero-day exploit
03
Mar
2025

Serbian student activist’s phone hacked using Cellebrite zero-day exploit

Serbian student activist’s phone hacked using Cellebrite zero-day exploit Pierluigi Paganini March 03, 2025 Amnesty International reports that a Cellebrite…

week in security
03
Mar
2025

A week in security (February 24 – March 2)

Last week on Malwarebytes Labs: Millions of stalkerware users exposed again PayPal’s “no-code checkout” abused by scammers Countries and companies…

Cyberattack on POLSA
03
Mar
2025

Poland Investigates The Cyberattack On POLSA

The Polish officials has confirmed that the country’s cybersecurity services had detected an unauthorized breach of the Polish Space Agency’s…

Naveen Goud
03
Mar
2025

Russia not a cyber threat to the United States

In recent years, media outlets across the United States have heavily reported on the rising concerns surrounding Russia, portraying it…

03
Mar
2025

How QR code attacks work and how to protect yourself

QR codes have become an integral part of our everyday life due to their simplicity. While they’ve been around for…

Naveen Goud
03
Mar
2025

Pros and Cons of Using AI in Cybersecurity

In today’s digital age, cybersecurity is more critical than ever before. With the increasing sophistication of cyberattacks and the expanding…

03
Mar
2025

Commix: Open-source OS command injection exploitation tool

Commix is an open-source penetration testing tool designed to automate the detection and exploitation of command injection vulnerabilities, streamlining security…