Author: Cybernoz
Cybersecurity researchers have identified a sophisticated new command-and-control framework that exploits legitimate Google Calendar APIs to establish covert communication channels…
A sophisticated cryptojacking campaign that hijacks Windows’ native Character Map utility (“charmap.exe”) to evade Windows Defender and covertly mine cryptocurrency…
Security teams began observing a novel botnet strain slipping beneath the radar of standard Windows Defender defenses in early August…
A sophisticated North Korean cyber operation has been exposed, revealing how state-sponsored hackers systematically monitor cybersecurity intelligence platforms to detect…
Sep 05, 2025The Hacker NewsPentesting / Security Operations Pentesting remains one of the most effective ways to identify real-world security…
Czechia’s national cybersecurity watchdog has issued a warning about foreign cyber operations, focussed on Chinese data transfers and remote administration,…
A new technique that allows attackers to read highly sensitive files on Windows systems, bypassing many of the modern security…
A novel serverless command-and-control (C2) technique that abuses Google Calendar APIs to obscure malicious traffic inside trusted cloud services. Dubbed…
Texas Attorney General Ken Paxton has filed a lawsuit against PowerSchool, a California-based education technology provider. Lawsuit is filed over…
France’s CNIL fined Google $379M and Shein $175M for breaching cookie rules Pierluigi Paganini September 05, 2025 France’s data watchdog…
Australia’s Qantas Airways said on Friday it had lowered bonuses for its CEO and her team as the airline shoulders…
A previously unseen malware campaign began circulating in early August 2025, through email attachments and web downloads, targeting users in…











