Author: Cybernoz

Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework
05
Sep
2025

Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework

Cybersecurity researchers have identified a sophisticated new command-and-control framework that exploits legitimate Google Calendar APIs to establish covert communication channels…

New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto
05
Sep
2025

New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto

A sophisticated cryptojacking campaign that hijacks Windows’ native Character Map utility (“charmap.exe”) to evade Windows Defender and covertly mine cryptocurrency…

New NightshadeC2 Botnet Uses 'UAC Prompt Bombing' to Bypass Windows Defender Protections
05
Sep
2025

New NightshadeC2 Botnet Uses ‘UAC Prompt Bombing’ to Bypass Windows Defender Protections

Security teams began observing a novel botnet strain slipping beneath the radar of standard Windows Defender defenses in early August…

North Korean Hackers Expose Their Playbook for Swapping Infrastructure
05
Sep
2025

North Korean Hackers Expose Their Playbook for Swapping Infrastructure

A sophisticated North Korean cyber operation has been exposed, revealing how state-sponsored hackers systematically monitor cybersecurity intelligence platforms to detect…

Automation Is Redefining Pentest Delivery
05
Sep
2025

Automation Is Redefining Pentest Delivery

Sep 05, 2025The Hacker NewsPentesting / Security Operations Pentesting remains one of the most effective ways to identify real-world security…

Chinese Data Transfer, Czechia, Czechia Warning, China, Remote Administration, Critical Infrastructure
05
Sep
2025

Czechia Warns Of Chinese Data Transfers And Remote Administration For Espionage

Czechia’s national cybersecurity watchdog has issued a warning about foreign cyber operations, focussed on Chinese data transfers and remote administration,…

Hackers May Leverage Raw Disk Reads to Bypass EDR Solutions and Access Highly Sensitive Files
05
Sep
2025

Hackers May Leverage Raw Disk Reads to Bypass EDR Solutions and Access Highly Sensitive Files

A new technique that allows attackers to read highly sensitive files on Windows systems, bypassing many of the modern security…

Hackers Exploit Google Calendar API with Serverless MeetC2 Framework
05
Sep
2025

Hackers Exploit Google Calendar API with Serverless MeetC2 Framework

A novel serverless command-and-control (C2) technique that abuses Google Calendar APIs to obscure malicious traffic inside trusted cloud services. Dubbed…

PowerSchool Data Breach Sparks Lawsuit From Texas AG Paxtn
05
Sep
2025

PowerSchool Data Breach Sparks Lawsuit From Texas AG Paxtn

Texas Attorney General Ken Paxton has filed a lawsuit against PowerSchool, a California-based education technology provider. Lawsuit is filed over…

France’s CNIL fined Google $379M and Shein $175M for breaching cookie rules
05
Sep
2025

France’s CNIL fined Google $379M and Shein $175M for breaching cookie rules

France’s CNIL fined Google $379M and Shein $175M for breaching cookie rules Pierluigi Paganini September 05, 2025 France’s data watchdog…

Australia’s Qantas Airways penalises CEO over data breach with bonus cut
05
Sep
2025

Australia’s Qantas Airways penalises CEO over data breach with bonus cut

Australia’s Qantas Airways said on Friday it had lowered bonuses for its CEO and her team as the airline shoulders…

Colombian Malware Weaponizing SWF and SVG to Bypass Detection
05
Sep
2025

Colombian Malware Weaponizing SWF and SVG to Bypass Detection

A previously unseen malware campaign began circulating in early August 2025, through email attachments and web downloads, targeting users in…