Author: Cybernoz

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus
28
Feb
2025

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

Feb 28, 2025Ravie LakshmananFinancial Fraud / Cyber Espionage The threat actor known as Sticky Werewolf has been linked to targeted…

Password Security
28
Feb
2025

How to Protect Your Digital Identity While Gaming Online

Playing games online provides entertainment but exposes you to specific dangers during gameplay. Hackers and scammers specifically target your personal…

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training
28
Feb
2025

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow…

NHS staff lack confidence in health service cyber measures
28
Feb
2025

NHS staff lack confidence in health service cyber measures

Frontline and backend NHS staff alike all understand the role they have to play in protecting Britain’s health service from…

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security
28
Feb
2025

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM Java Agent, potentially enabling attackers…

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally
28
Feb
2025

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check Point VPN vulnerability (CVE-2024-24919) to…

CVE-2025-27364
28
Feb
2025

CVE-2025-27364 In MITRE Caldera: Critical RCE Vulnerability

CVE-2025-27364, a critical Remote Code Execution (RCE) flaw has been discovered in MITRE Caldera, an open-source adversary emulation platform used…

E-Wallets
28
Feb
2025

Securing E-Wallets & Crypto: Must-Have Security Tools

The dawn of AI and advanced technological tools has rendered previous security measures vulnerable to high-level cyberattacks. However, cybersecurity specialists…

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)'s staff emails
28
Feb
2025

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails Pierluigi Paganini February 28, 2025 Belgian authorities…

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data
28
Feb
2025

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has been uncovered, exposing a dangerous…

Cleveland Municipal Court
28
Feb
2025

Cyberattack Forces Cleveland Municipal Court To Shutdown

Cleveland Municipal Court has been closed for three consecutive days following a cybersecurity incident that has disrupted its internal systems….

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords
28
Feb
2025

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language models (LLMs) like DeepSeek—has uncovered…