Author: Cybernoz

Tim Starks
25
Apr
2025

AI speeds up analysis work for humans, two federal cyber officials say

Two federal cybersecurity officials said Thursday that they’re using — or contemplating using — artificial intelligence to conduct tasks that…

Weaponized SVG Files Used by Threat Actors to Redirect Users to Malicious Sites
25
Apr
2025

Weaponized SVG Files Used by Threat Actors to Redirect Users to Malicious Sites

Cybercriminals are increasingly weaponizing Scalable Vector Graphics (SVG) files to orchestrate sophisticated phishing campaigns. According to research from Intezer, a…

A screengrab of Patrick Miller, CEO and owner of Ampyx Cyber, an industrial security consulting firm, testifying before the US-China Economic and Security Review Commission in Washington on Thursday.
25
Apr
2025

China-backed actors ‘stand out’ in threatening US energy infrastructure, panel hears

China-backed actors “stand out” in threatening America’s energy infrastructure and could disrupt the country’s power networks in the event of…

Protecting Your Phone—and Your Privacy—at the US Border
25
Apr
2025

Protecting Your Phone—and Your Privacy—at the US Border

Lauren Goode: I think Katie should go first. She’s the boss. Katie Drummond: So as you all know, because I…

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell
25
Apr
2025

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy malicious tools including a web…

Judge tosses citizenship provisions in Trump elections order
25
Apr
2025

Judge tosses citizenship provisions in Trump elections order

A federal court partially blocked a Trump administration executive order Thursday that seeks to impose requirements on states to use…

How fraudsters abuse Google Forms to spread scams
25
Apr
2025

How fraudsters abuse Google Forms to spread scams

The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe. 23…

Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
25
Apr
2025

Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts

Russian threat actors have been abusing legitimate OAuth 2.0 authentication workflows to hijack Microsoft 365 accounts of employees of organizations related…

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT
24
Apr
2025

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT

A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative and insidious methods attackers employ…

Email
24
Apr
2025

Microsoft fixes machine learning bug flagging Adobe emails as spam

Microsoft says it mitigated a known issue in one of its machine learning (ML) models that mistakenly flagged Adobe emails…

24
Apr
2025

Microsoft fixes machine learning bug flagging Adobe emails as spam

Microsoft says it mitigated a known issue in one of its machine learning (ML) models that mistakenly flagged Adobe emails…

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining
24
Apr
2025

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured Kubernetes clusters to conduct illicit activities…