Author: Cybernoz

Defence trials AI radiocomms deception technology
27
May
2025

Defence trials AI radiocomms deception technology

The Australian Army is trialling technology that generates fake radio communications in order to mislead adversaries and protect frontline personnel….

FBI Issues on Silent Ransom Group Using Fake IT Support Calls to Target Victims
26
May
2025

FBI Issues on Silent Ransom Group Using Fake IT Support Calls to Target Victims

The Federal Bureau of Investigation (FBI) has issued a critical alert regarding the escalating activities of the cyber threat actor…

SilverRAT Source Code Leaked Online: Here’s What You Need to Know
26
May
2025

Here’s What You Need to Know

The full source code of SilverRAT, a notorious remote access trojan (RAT), has been leaked online briefly appearing on GitHub…

ChatGPT Deep Research Now Integrates with Dropbox and OneDrive to Retrieve Data
26
May
2025

ChatGPT Deep Research Now Integrates with Dropbox and OneDrive to Retrieve Data

ChatGPT has rolled out a beta feature called Deep Research Connectors, designed to integrate seamlessly with third-party applications such as…

Marlboro-Chesterfield Pathology data breach impacted 235,911 individuals
26
May
2025

Marlboro-Chesterfield Pathology data breach impacted 235,911 individuals

Marlboro-Chesterfield Pathology data breach impacted 235,911 individuals Pierluigi Paganini May 26, 2025 SafePay ransomware hit Marlboro-Chesterfield Pathology, stealing personal data…

Hackers Reportedly Selling Over 500 Stolen Crypto Databases on Dark-Web Forums
26
May
2025

Hackers Reportedly Selling Over 500 Stolen Crypto Databases on Dark-Web Forums

A hackers has made news by allegedly selling a ZIP archive containing more than 500 compromised databases, which seems to…

Meteobridge web interface Vulnerability Let Attackers Inject Commands Remotely
26
May
2025

Meteobridge web interface Vulnerability Let Attackers Inject Commands Remotely

ONEKEY Research Lab has uncovered a severe command injection vulnerability in the MeteoBridge firmware, a compact device designed to connect…

60 Malicious npm Packages Exfiltrate Hostnames, IP Addresses, and DNS Server Details
26
May
2025

60 Malicious npm Packages Exfiltrate Hostnames, IP Addresses, and DNS Server Details

A Socket’s Threat Research Team has revealed a sophisticated and ongoing campaign targeting the npm ecosystem, involving 60 malicious packages…

26
May
2025

Hive Five 225 – The Way of Code

While doing some reflecting, here are some states of being I want to achieve: Minimalism: A focus on simplicity, where…

Chinese Hackers Exploit Cityworks 0-Day to Hit US Local Agencies
26
May
2025

Chinese Hackers Exploit Cityworks 0-Day to Hit US Local Agencies

Cisco Talos warns of active exploitation of a zero-day vulnerability (CVE-2025-0994) in Cityworks supposedly by Chinese hackers from the UAT-6382…

Sophisticated Hacker Group Targeting Government and Enterprise Networks
26
May
2025

Sophisticated Hacker Group Targeting Government and Enterprise Networks

A decade-long cyber espionage campaign orchestrated by the advanced persistent threat (APT) group TA-ShadowCricket has been exposed through a joint…

Over 40 Malicious Chrome Extensions Impersonate Popular Brands to Steal Sensitive Data
26
May
2025

Over 40 Malicious Chrome Extensions Impersonate Popular Brands to Steal Sensitive Data

Cybersecurity firm LayerX has uncovered over 40 malicious Chrome browser extensions, many of which are still available on the Google…