Author: Cybernoz

Jwt-Hack: Reborn in Rust | HAHWUL
08
Jun
2025

Jwt-Hack: Reborn in Rust | HAHWUL

jwt-hack v2 is a complete Rust rewrite, boosting performance, safety, and stability. Back in October 2020, I created a tool…

DevSecOps | HAHWUL
08
Jun
2025

DevSecOps | HAHWUL

Roadmap for everyone who wants DevSecOps DevSecOps is a culture and practice that aims to integrate security into every phase…

08
Jun
2025

Week in review: Google fixes exploited Chrome zero-day, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: June 2025 Patch Tuesday forecast:…

NPM
07
Jun
2025

Malicious npm packages posing as utilities delete project directories

Two malicious packages have been discovered in the npm JavaScript package index, which masquerades as useful utilities but, in reality,…

NPM
07
Jun
2025

Supply chain attack hits Gluestack NPM packages with 960K weekly downloads

A significant supply chain attack hit NPM after 16 popular Gluestack ‘react-native-aria’ packages with over 950,000 weekly downloads were compromised to…

Over 20 Malicious Apps on Google Play Target Users for Seed Phrases
07
Jun
2025

Over 20 Malicious Apps on Google Play Target Users for Seed Phrases

A recent investigation by threat intelligence firm Cyble has spotted a campaign targeting cryptocurrency users through the Google Play Store…

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source
07
Jun
2025

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source

Experts found 4 billion user records online, the largest known leak of Chinese personal data from a single source Pierluigi…

Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
07
Jun
2025

Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux

Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux,…

The Mystery of iPhone Crashes That Apple Denies Are Linked to Chinese Hacking
07
Jun
2025

The Mystery of iPhone Crashes That Apple Denies Are Linked to Chinese Hacking

All of that would represent a serious threat to national security. Except that, strangely, Apple flatly denies it happened. “We…

New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
07
Jun
2025

New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers

A sophisticated new information-stealing malware written in the Rust programming language has emerged, demonstrating advanced capabilities to extract sensitive data…

Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
07
Jun
2025

Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts

Cybersecurity researchers have identified a sophisticated new social engineering campaign that exploits fundamental human trust in everyday computer interactions. The…

Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
07
Jun
2025

Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User

A sophisticated malware distribution campaign has weaponized over 140 GitHub repositories to target inexperienced cybercriminals and gaming cheat users, representing…