Author: Cybernoz
While tried and true tactics like phishing and malware are here to stay, there are always new approaches to watch…
Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…
Pwn2Own Automotive 2024 takes place in Tokyo, Japan, from January 24 to 26. The Pwn2Own Automotive 2024 hacking contest, taking…
Currently, over 75% of countries worldwide use electronic documents equipped with NFC chips. Due to this fact, virtually every business…
Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins…
Cisco has developed technology to help developers manage the software agents they use to monitor applications and IT infrastructure. Smart…
Predatory Sparrow is distinguished most of all by its apparent interest in sending a specific geopolitical message with its attacks,…
Check Point’s Live Cyber Threat Map identified 20,000 instances of QR code phishing and malware attacks within two weeks, highlighting…
ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood…
The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from…
The year 2023 was another one characterised by uncertainty. Once again, global instability has muddied the waters, making coming up…
All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s…











