Author: Cybernoz

The sophistication of cybercriminals intensifies with emerging strategies for cashing in or causing chaos
25
Jan
2024

The sophistication of cybercriminals intensifies with emerging strategies for cashing in or causing chaos

While tried and true tactics like phishing and malware are here to stay, there are always new approaches to watch…

Webinar
25
Jan
2024

Kasseika Ransomware Exploits Driver Functionality to Kill Antivirus

Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…

Pwn2Own Automotive: Tesla, Sony, Alpine Players Breached on Day One
25
Jan
2024

Tesla, Sony, Alpine Players Breached on Day One

Pwn2Own Automotive 2024 takes place in Tokyo, Japan, from January 24 to 26. The Pwn2Own Automotive 2024 hacking contest, taking…

Regula introduces smart testing for remote onboarding efficiency
25
Jan
2024

Regula introduces smart testing for remote onboarding efficiency

Currently, over 75% of countries worldwide use electronic documents equipped with NFC chips. Due to this fact, virtually every business…

Critical Jenkins Vulnerability
25
Jan
2024

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks

Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins…

Cisco updates AppDynamics with Smart Agents to tackle sprawl
25
Jan
2024

Cisco updates AppDynamics with Smart Agents to tackle sprawl

Cisco has developed technology to help developers manage the software agents they use to monitor applications and IT infrastructure. Smart…

How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar
25
Jan
2024

How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar

Predatory Sparrow is distinguished most of all by its apparent interest in sending a specific geopolitical message with its attacks,…

QR Code Phishing Soars 587%: Users Falling Victim to Social Engineering Scams
25
Jan
2024

Users Falling Victim to Social Engineering Scams

Check Point’s Live Cyber Threat Map identified 20,000 instances of QR code phishing and malware attacks within two weeks, highlighting…

Blackwood APT delivers malware by hijacking legitimate software update requests
25
Jan
2024

Blackwood APT delivers malware by hijacking legitimate software update requests

ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood…

Cyber Threat Landscape
25
Jan
2024

7 Key Findings and Upcoming Trends for 2024

The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from…

IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
25
Jan
2024

IT Sustainability Think Tank: Why 2024 should be less about predicting and more about acting

The year 2023 was another one characterised by uncertainty. Once again, global instability has muddied the waters, making coming up…

AI expected to increase volume, impact of cyberattacks
25
Jan
2024

AI expected to increase volume, impact of cyberattacks

All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s…