Author: Cybernoz

ConnectWise ScreenConnect Tops List of Abused RATs in 2025 Attacks
23
May
2025

ConnectWise ScreenConnect Tops List of Abused RATs in 2025 Attacks

A new report from Cofense Intelligence reveals a troubling trend in cyberattacks: criminals are increasingly hijacking legitimate Remote Access Tools…

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000
23
May
2025

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code execution (RCE) access to Burger King…

Senators take another swing at vulnerability disclosure policy bill for federal contractors
23
May
2025

Senators take another swing at vulnerability disclosure policy bill for federal contractors

A bipartisan pair of senators is taking another shot at legislation that would require federal government contractors to follow National…

Hacker steals $223 million in Cetus Protocol cryptocurrency heist
23
May
2025

Hacker steals $223 million in Cetus Protocol cryptocurrency heist

The decentralized exchange Cetus Protocol announced that hackers have stolen $223 million in cryptocurrency and is offering a deal to…

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
23
May
2025

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a…

Dozens of malicious packages on NPM collect host and network data
23
May
2025

Dozens of malicious packages on NPM collect host and network data

60 packages have been discovered in the NPM index that attempt to collect sensitive host and network data and send it…

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets
23
May
2025

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt DNS infrastructure, manipulate Non-Human Identity…

Operation Endgame Takes Down DanaBot Malware, Neutralizes 300 Servers
23
May
2025

Operation Endgame Takes Down DanaBot Malware, Neutralizes 300 Servers

In a major international operation coordinated by Europol and Eurojust, law enforcement agencies and private sector partners have successfully dismantled…

Lumma Stealer down for the count
23
May
2025

Lumma Stealer down for the count

The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of…

Researchers Uncover Infrastructure and TTPs Behind ALCATRAZ Malware
23
May
2025

Researchers Uncover Infrastructure and TTPs Behind ALCATRAZ Malware

Elastic Security Labs has recently exposed a sophisticated new malware family dubbed DOUBLELOADER, observed in conjunction with the RHADAMANTHYS infostealer….

commvault m365 threat campaign saas security cloud security
23
May
2025

Commvault M365 Threat Could Be Part Of Broader SaaS Campaign

Nation-state threat actors targeting Commvault applications hosted in Microsoft Azure may be part of a broader campaign targeting Software-as-a-Service (SaaS)…

GitLab Duo Vulnerability Exploited to Inject Malicious Links and Steal Source Code
23
May
2025

GitLab Duo Vulnerability Exploited to Inject Malicious Links and Steal Source Code

A security vulnerability was recently discovered in GitLab Duo, the AI-powered coding assistant integrated into GitLab and based on Anthropic’s…