Author: Cybernoz

Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION
04
May
2025

Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini May 04, 2025 A new round of…

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference
04
May
2025

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RSAC 2025 ConferenceRSAC 2025 Conference…

Threat Actors Attacking U.S. citizens Via social engineering Attack
04
May
2025

Threat Actors Attacking U.S. citizens Via social engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting U.S. citizens, according to a detailed…

Browser Credential & Sensitive‑Data Heists on the Rise
04
May
2025

Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the notorious financially motivated threat actor Golden…

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape
04
May
2025

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape

Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid ongoing conflicts. In 2024, Forescout Technologies…

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives
04
May
2025

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at a scale previously underestimated, creating a…

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss
04
May
2025

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem in April 2025. Hackers have weaponized…

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques
04
May
2025

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool in the arsenal of multiple threat…

Threat Actors Use AiTM Attacks with Reverse Proxies to Bypass MFA
04
May
2025

Threat Actors Use AiTM Attacks with Reverse Proxies to Bypass MFA

Cybercriminals are intensifying their efforts to undermine multi-factor authentication (MFA) through adversary-in-the-middle (AiTM) attacks, leveraging reverse proxies to intercept sensitive…

WebDAV & SCF Exploits Fuel Credential Heists
04
May
2025

WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often delivering payloads like Cobalt Strike and,…

Threat Actors Target Critical National Infrastructure with New Malware and Tools
04
May
2025

Threat Actors Target Critical National Infrastructure with New Malware and Tools

A recent investigation by the FortiGuard Incident Response (FGIR) team has uncovered a sophisticated, long-term cyber intrusion targeting critical national…

New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts
04
May
2025

New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts

StealC, a notorious information stealer and malware downloader first sold in January 2023, has rolled out its version 2 (V2)…