Author: Cybernoz

Russia-Linked SpyPress Malware Exploits Webmails to Spy on Ukraine
18
May
2025

Russia-Linked SpyPress Malware Exploits Webmails to Spy on Ukraine

ESET reports on RoundPress, a cyber espionage campaign by Russia’s Fancy Bear (Sednit) targeting Ukraine-related organizations via webmail vulnerabilities and…

FBI Warns of AI Voice Scams Impersonating US Govt Officials
18
May
2025

FBI Warns of AI Voice Scams Impersonating US Govt Officials

FBI has warned about a sophisticated vishing and smishing campaign using AI-generated voice memos to impersonate senior US officials and…

CORS Misconfigurations: Advanced Exploitation Guide
18
May
2025

CORS Misconfigurations: Advanced Exploitation Guide

CORS misconfiguration vulnerabilities are a highly underestimated vulnerability class. With an impact ranging from sensitive information disclosure to facilitating SSRF…

How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
18
May
2025

How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes

They tried logging into secure.telemessage.com using a pair of these credentials and discovered that they had just hacked a user…

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide
18
May
2025

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide Pierluigi Paganini May 18, 2025 Chinese…

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited
18
May
2025

Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Patch Tuesday: Microsoft fixes 5…

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files
18
May
2025

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

A new information-stealing malware dubbed “PupkinStealer” has been identified by cybersecurity researchers, targeting sensitive user data through a straightforward yet…

Malware Defense 101 - Identifying and Removing Modern Threats
17
May
2025

Malware Defense 101 – Identifying and Removing Modern Threats

The cybersecurity landscape in 2025 is defined by increasingly sophisticated malware threats, with attackers leveraging artificial intelligence, evasion tactics, and…

AI Security Frameworks - Ensuring Trust in Machine Learning
17
May
2025

AI Security Frameworks – Ensuring Trust in Machine Learning

As artificial intelligence transforms industries and enhances human capabilities, the need for strong AI security frameworks has become paramount. Recent…

Preventing Phishing Attacks on Cryptocurrency Exchanges
17
May
2025

Preventing Phishing Attacks on Cryptocurrency Exchanges

Cryptocurrency exchanges are intensifying security measures in 2025 to focus on preventing phishing attacks, as these scams reach alarming levels…

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials
17
May
2025

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials Pierluigi Paganini May 17, 2025…

Microsoft Defender
17
May
2025

New ‘Defendnot’ tool tricks Windows into disabling Microsoft Defender

A new tool called ‘Defendnot’ can disable Microsoft Defender on Windows devices by registering a fake antivirus product, even when no…