Author: Cybernoz

Snatch Ransomware Group Claims The FDVA Cyber Attack
14
Dec
2023

Twelve Claims SKTB Biofizpribor Data Breach

The pro-Ukraine hacking group known as Twelve has claimed responsibility for infiltrating the systems of SKTB Biofizpribor, a Russian organization…

Beware of Malicious 7ZIP on the Microsoft App Store
14
Dec
2023

Beware of Malicious 7ZIP on the Microsoft App Store

Hackers target 7ZIP due to its widespread use and popularity, making it a lucrative vector for spreading malware.  Exploiting vulnerabilities…

The Rising Tide of Cybercrime as A Service (CaaS)
14
Dec
2023

The Rising Tide of Cybercrime as A Service (CaaS)

By Nik Hewitt, Sr. Content Marketing Manager, TrueFort Welcome to the era of Cybercrime as a Service, or CaaS, which,…

Cybercrime Network
14
Dec
2023

Microsoft Takes Legal Action to Crack Down on Storm-1152’s Cybercrime Network

Dec 14, 2023NewsroomCybercrime / Threat intelligence Microsoft on Wednesday said it obtained a court order to seize infrastructure set up…

Snatch Ransomware Group Claims The FDVA Cyber Attack
14
Dec
2023

Dr. Yusuf Hashmi On Cybersecurity Challenges

In the world of cybersecurity where security professionals and hackers collide, Chief Information Security Officers (CISOs) play a pivotal role…

Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security
14
Dec
2023

Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security

By Alan Bavosa, VP of Security Products, Appdome In recent years, mobile apps have surged in popularity providing consumers with…

Digital ops and ops management security predictions for 2024
14
Dec
2023

Digital ops and ops management security predictions for 2024

CISOs don’t need a crystal ball – they already know that 2024 will be another tough year, especially with AI…

Microsoft ICSpector: A leap forward in industrial PLC metadata analysis
14
Dec
2023

Microsoft ICSpector: A leap forward in industrial PLC metadata analysis

Microsoft ICSpector is an open-source forensics framework that enables the analysis of industrial PLC metadata and project files. Architecture The…

Organizations prefer a combination of AI and human analysts to monitor their digital supply chain
14
Dec
2023

Organizations prefer a combination of AI and human analysts to monitor their digital supply chain

The number of cyber breaches targeting organizations’ supply chains continues to rise, with an average 4.16 breaches reported to be…

SPACE Dynamic Orchestration in the SASE Cloud with Cato Networks
14
Dec
2023

Expanding Reach and Reducing Costs: Cato Enhances Capabilities with Latest Third-Party Integrations

According to Gartner’s projections, by the close of 2024, more than 40% of enterprises are expected to have well-defined strategies…

Application Security 2023 - State of Security 2023
14
Dec
2023

Application Security 2023 – State of Security 2023

When it comes to application security – the vulnerabilities that make trouble in the code that ships at the end…

China-linked APT Volt Typhoon linked to KV-Botnet
14
Dec
2023

China-linked APT Volt Typhoon linked to KV-Botnet

China-linked APT Volt Typhoon linked to KV-Botnet Pierluigi Paganini December 14, 2023 Researchers linked a sophisticated botnet, tracked as KV-Botnet,…