Author: Cybernoz

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads
10
May
2025

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads

A sophisticated supply chain attack targeting the popular npm package ‘rand-user-agent’ was discovered on May 5, 2025. The compromise affects…

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands
10
May
2025

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands

A new ransomware strain dubbed “Mamona” that operates entirely offline and leverages a clever attack strategy that abuses the Windows…

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands
10
May
2025

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands

A seemingly innocent Python package has been unmasked as a sophisticated remote access trojan (RAT) targeting the Discord developer community….

Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results
10
May
2025

Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results

Cybersecurity experts have uncovered a sophisticated attack campaign targeting IT administrators through search engine optimization (SEO) poisoning tactics. Threat actors…

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors
10
May
2025

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors

A critical remote code execution vulnerability in SAP NetWeaver Visual Composer (CVE-2025-31324) is being actively exploited by a Chinese threat…

Threat Actors Attacking Job Seekers With Three New Unique Adversaries
10
May
2025

Threat Actors Attacking Job Seekers With Three New Unique Adversaries

A significant surge in sophisticated recruitment scams has emerged, with cybercriminals exploiting economic vulnerabilities and the competitive job market to…

Matt Kapko
10
May
2025

SonicWall customers confront resurgence of actively exploited vulnerabilities

Vulnerabilities are proliferating in SonicWall devices and software this year, putting the vendor’s customers at risk of intrusion via secure…

Print Friendly, PDF & Email
10
May
2025

In Defense of C/C++ (Part 3)

In this third part of the series on secure programming in C and C++ I will be looking into some…

Print Friendly, PDF & Email
09
May
2025

Webinar: The Humanized Internet – Dignity, Digital Identity, and Democracy

Join the authors and contributors of The Humanized Internet for an engaging discussion on the future of digital identity, privacy,…

end-of-life routers botnet
09
May
2025

Botnet Made Up Of 7,000 End-Of-Life Routers Taken Down

A joint U.S.-Dutch law enforcement operation has taken down a botnet-for-hire that was comprised of thousands of end-of-life routers. The…

Botnet
09
May
2025

Police dismantles botnet selling hacked routers as residential proxies

Law enforcement authorities have dismantled a botnet that infected thousands of routers over the last 20 years to build two…

New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads
09
May
2025

New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads

An advanced supply chain attack has targeted the well-known npm package rand-user-agent, which receives about 45,000 downloads every week, in…