Author: Cybernoz
CyberVolk, a pro-Russia hacktivist group, has reemerged with a new ransomware platform called VolkLocker following a period of dormancy in…
Managing complex responsibilities is a common task for digital leaders. However, for Erik Mayer, transformation chief clinical information officer (CCIO)…
I recently had, what I thought, was a unique brainwave. (Spoiler alert: it wasn’t, but please read on!) As a…
A sophisticated new phishing attack technique called “ConsentFix” that combines OAuth consent phishing with ClickFix-style prompts to compromise Microsoft accounts…
Elastic detects stealthy NANOREMOTE malware using Google Drive as C2 Pierluigi Paganini December 12, 2025 Elastic found a new Windows…
Amelia Coen | 12 December 2025 at 11:34 UTC In 2025, we set out with a simple mission: take Burp…
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their…
Free unofficial patches are available for a new Windows zero-day vulnerability that allows attackers to crash the Remote Access Connection…
MITRE has unveiled its 2025 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list, highlighting the root causes…
When you’re shopping around for a Virtual Private Network (VPN) you’ll find yourself in a sea of promises like “military-grade…
The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions…
Open sourcing artificial intelligence (AI) can help combat concentrations of capital and power that currently define its development, while nascent…
