Author: Cybernoz

Google Chrome
28
Feb
2025

16 Google Chrome Extensions Hijacked – Are You Affected?

A new cybersecurity breach has put over 3.2 million Google Chrome users at risk after hackers hijacked popular browser extensions,…

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files
28
Feb
2025

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in Taiwan through malicious PDF attachments disguised…

Infosec products of the month: February 2025
28
Feb
2025

Infosec products of the month: February 2025

Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Armor, BigID, Dynatrace, Fortinet,…

Advanced phishing tactics used to steal PayPal credentials
28
Feb
2025

PayPal’s “no-code checkout” abused by scammers

We recently identified a new scam targeting PayPal customers with very convincing ads and pages. Crooks are abusing both Google…

GHOSTR Hacker Linked to 90+ Data Breaches Arrested
28
Feb
2025

GHOSTR Hacker Linked to 90+ Data Breaches Arrested

A coordinated effort between law enforcement in Thailand, Singapore, and cybersecurity firm Group-IB has led to the arrest of a…

Android
28
Feb
2025

Vo1d malware botnet grows to 1.6 million Android TVs worldwide

A new variant of the Vo1d malware botnet has grown to 1,590,299 infected Android TV devices across 226 countries, recruiting…

FBI says North Korea was responsible for US$1.5 billion ByBit hack
28
Feb
2025

FBI says North Korea was responsible for US$1.5 billion ByBit hack – Security

The Federal Bureau of Investigation said that North Korea was responsible for the theft of approximately US$1.5 billion ($2.4 billion)…

France
28
Feb
2025

Privacy tech firms warn France’s encryption and VPN laws threaten privacy

Privacy-focused email provider Tuta (previously Tutanota) and the VPN Trust Initiative (VTI) are raising concerns over proposed laws in France set…

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections
28
Feb
2025

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that exploits a legitimate antivirus driver…

Defence vacates Global Switch a year ahead of lease expiry
27
Feb
2025

Defence vacates Global Switch a year ahead of lease expiry – Cloud – Hardware – Storage

Defence has completed its withdrawal from Global Switch Australia’s data centres a year ahead of its lease expiry, iTnews can…

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations
27
Feb
2025

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia, targeting a prominent real estate…

How to Use Slack for Business: Workplace Communication
27
Feb
2025

How to Use Slack for Business: Workplace Communication

Do you want to have the best communication system at your workplace? Learn how to maximize the benefits of Slack…