Author: Cybernoz

17
May
2024

SEC Updates 24-Yr-Old Rule To Better Protect Financial Data

The SEC is tightening its focus on financial data breach response mechanisms of very specific set of financial institutions, with…

LockBit gang claimed responsibility for the attack on City of Wichita
17
May
2024

City of Wichita disclosed a data breach after the ransomware attack

City of Wichita disclosed a data breach after the recent ransomware attack Pierluigi Paganini May 17, 2024 The City of…

YARA, the Malware Researchers Toolbox Evolved
17
May
2024

YARA, the Malware Researchers Toolbox Evolved

Malware experts all over the world can’t do their jobs without YARA. YARA has been updated many times to add…

Weekly 60-Second 'Security Nudge' Launches On The Cybercrime Magazine Podcast
17
May
2024

7 Ways To Protect Your Company

17 May Cybersecurity Tips For Small Businesses: 7 Ways To Protect Your Company Posted at 08:53h in Blogs by Di…

80% of Exposures from Misconfigurations, Less Than 1% from CVEs
17
May
2024

80% of Exposures from Misconfigurations, Less Than 1% from CVEs

A new report from XM Cyber has found – among other insights – a dramatic gap between where most organizations…

IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
17
May
2024

IT Sustainability Think Tank: Helping CIOs and IT directors navigate the green IT landscape

In the contemporary landscape of corporate responsibility, environmental sustainability has become a vital concern. With enterprises facing increasing regulatory pressure…

CISA Adds Flaws To Known Exploited Vulnerabilities Catalog
17
May
2024

CISA Adds Flaws To Known Exploited Vulnerabilities Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its known exploited vulnerabilities catalog to include three new entries,…

New Cyber Attack Targeting Facebook Business Accounts
17
May
2024

New Cyber Attack Targeting Facebook Business Accounts

The email campaign impersonates the Facebook Ads Team to trick users into clicking a malicious link, as the email leverages…

ViperSoftX Malware Uses Deep Learning Model To Execute Commands
17
May
2024

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…

17
May
2024

US exposes scheme enabling North Korean IT workers to bypass sanctions

The US Justice Department had unsealed charges against a US woman and an Ukranian man who, along with three unidentified…

Legal Battles Emerge After Ascension Ransomware Attack
17
May
2024

Legal Battles Emerge After Ascension Ransomware Attack

Following the recent Ascension ransomware attack, legal challenges are mounting for the healthcare giant. Just days after the cyberattack disrupted…

Threat Actor USDoD Announces Creation of 'Breach Nation', Following BreachForums Take Down
17
May
2024

USDoD Announces Creation Of Breach Nation Forum

While the recent takedown of BreachForums by the FBI, in collaboration with international law enforcement agencies, marked a significant victory…