Author: Cybernoz

Blackwood APT Hackers Use DLL Loader to Escalate Privileges
30
Jan
2024

Blackwood APT Hackers Use DLL Loader to Escalate Privileges

The recent discovery of a new DLL loader associated with the notorious Blackwood APT group has sent shivers down the…

ransomware
30
Jan
2024

Ransomware Research Reveals Millions Spent Despite Do Not Pay Policies

Research commissioned by Cohesity, a leader in AI-powered data security and management, reveals the majority of companies are paying ransoms…

Webinar
30
Jan
2024

APT Hackers Using FalseFont Backdoor to Hacked Computer

Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data. In this…

Simple Yet Vital Tips to Send Documents Securely via Email
30
Jan
2024

Simple Yet Vital Tips to Send Documents Securely via Email

In the information age where knowledge equals money, securing business communications, especially through e-mails, is critical and very important. Email…

Aembit Announces New Workload IAM Integration with CrowdStrike to Help Enterprises Secure Workload-to-Workload Access
30
Jan
2024

Aembit Announces New Workload IAM Integration with CrowdStrike to Help Enterprises Secure Workload-to-Workload Access

Aembit, the Workload Identity and Access Management (IAM) platform that enables DevOps and security teams to discover, manage, enforce and…

crowd before Taylor Swift concert
30
Jan
2024

Deepfake Taylor Swift images circulate online, politicians call for laws to ban deepfake creation

Deepfake images of Taylor Swift have really made some serious waves. Explicit images of the popstar, generated by Artificial Intelligence…

China-Linked Hackers
30
Jan
2024

China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz

Jan 30, 2024NewsroomMalware / Cyber Espionage The China-based threat actor known as Mustang Panda is suspected to have targeted Myanmar’s…

Researchers in Belgium move towards industrial production of qubits
30
Jan
2024

Quantum computing in 2024: What are the challenges?

Research looking at the development of quantum computing has found there has been continued investment in the technology, thanks in…

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
30
Jan
2024

What the Government Can Learn from the Private Sector in Pursuit of Zero Trust

By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order…

SAS joins fight against cybercrime as NCRCG National Ambassador
30
Jan
2024

SAS joins fight against cybercrime as NCRCG National Ambassador

This week, the National Cyber Resilience Centre Group (NCRCG) – a strategic collaboration between the Home Office, policing, academic and…

Protecting Your Business and Personal Data
30
Jan
2024

Protecting Your Business and Personal Data

By Brian Lonergan, VP of Product Strategy, Identity Digital October celebrated National Cybersecurity Awareness Month (NCSAM), a time when public…

Aembit Announces New Workload IAM Integration with CrowdStrike to Help Enterprises Secure Workload-to-Workload Access
30
Jan
2024

Aembit Announces New Workload IAM Integration with CrowdStrike to Help Enterprises Secure Workload-to-Workload Access

Silver Spring, Maryland, January 30th, 2024, Cyberwire Aembit Becomes the First Workload IAM Platform to Integrate with the Industry-Leading CrowdStrike…