Author: Cybernoz

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection
12
May
2025

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs (Uniform Resource Identifiers) to deliver credential…

Law enforcement takes down proxy botnets used by criminals
12
May
2025

Law enforcement takes down proxy botnets used by criminals

US and Dutch law enforcement, with the help of Lumen researchers, have disrupted 5socks and Anyproxy, two proxy-for-rent services that…

Matt Kapko
12
May
2025

US seizes Anyproxy, 5socks botnets and indicts alleged administrators

Federal authorities seized two domains and indicted four foreign individuals for alleged involvement in a long-running botnet service that infected…

Hacker
12
May
2025

Output Messenger flaw exploited as zero-day in espionage attacks

A Türkiye-backed cyberespionage group exploited a zero-day vulnerability to attack Output Messenger users linked to the Kurdish military in Iraq….

“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram
12
May
2025

“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram

A new information-stealing malware dubbed “PupkinStealer” has emerged as a significant threat to individuals and enterprises. Developed in C# using…

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week
12
May
2025

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week

A 20-year-old criminal proxy network has been disrupted through a joint operation involving Lumen’s Black Lotus Labs, the U.S. Department…

FakeUpdates, Remcos, AgentTesla Top Malware Charts in Stealth Attack Surge
12
May
2025

FakeUpdates, Remcos, AgentTesla Top Malware Charts in Stealth Attack Surge

Check Point’s April 2025 malware report reveals increasingly sophisticated and hidden attacks using familiar malware like FakeUpdates, Remcos, and AgentTesla….

Lee Enterprises spent $2M for ransomware recovery
12
May
2025

Lee Enterprises spent $2M for ransomware recovery

Lee Enterprises said it incurred $2 million in restoration costs due to a major cybersecurity attack in February that also…

Cybersecurity
12
May
2025

Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals

Browser extensions have become deeply embedded in employees’ daily workflows, aiding tasks from grammar checking to discount hunting. Yet, their…

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft
12
May
2025

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft

Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by script kiddies and hacktivists, have…

Arrest
12
May
2025

Moldova arrests suspect linked to DoppelPaymer ransomware attacks

Moldovan authorities have detained a 45-year-old suspect linked to DoppelPaymer ransomware attacks targeting Dutch organizations in 2021. Police officers searched…

Open Source Linux Firewall IPFire 2.29
12
May
2025

Open Source Linux Firewall IPFire 2.29

IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 – Core Update 194, packed with security enhancements,…