Author: Cybernoz

SpyLoan sells predatory loans
25
Feb
2025

Predatory app downloaded 100,000 times from Google Play Store steals data, uses it for blackmail

A malicious app claiming to be a financial management tool has been downloaded 100,000 times from the Google Play Store….

CommScope bets on AI for next wave of enterprise networking
25
Feb
2025

CommScope bets on AI for next wave of enterprise networking

It is beyond argument that artificial intelligence (AI) is now the driving force behind modern networks, and to address the…

Ransomware: on the murky trail of one of the leaders of Black Basta
25
Feb
2025

Ransomware: on the murky trail of one of the leaders of Black Basta

On 20 February, every cyber threat intelligence researcher on the planet discovered a new goldmine – a document of almost…

CVE-2017-3066
25
Feb
2025

CISA Adds CVE-2017-3066 And CVE-2024-20953 To KEV Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) Catalog by adding two critical…

Quantum innovation balances on commercial tightrope
25
Feb
2025

Quantum innovation balances on commercial tightrope

A paper published by Microsoft, which demonstrates a radical new approach that promises to accelerate the path towards commercially viable…

Russia warns financial sector organizations of IT service provider LANIT compromise
25
Feb
2025

Russia warns financial sector organizations of IT service provider LANIT compromise

Russia warns financial sector organizations of IT service provider LANIT compromise Pierluigi Paganini February 25, 2025 Russia’s NKTsKI warns financial…

LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms
25
Feb
2025

LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms

The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100 commands to infiltrate Android, iOS, Windows,…

Hackers Evade Outlook Spam Filters to Deliver Malicious ISO Files
25
Feb
2025

Hackers Evade Outlook Spam Filters to Deliver Malicious ISO Files

A newly discovered technique allows threat actors to circumvent Microsoft Outlook’s spam filters to deliver malicious ISO files, exposing organizations…

Naveen Goud
25
Feb
2025

Google to replace SMS authentication with QR Codes for enhanced Mobile Security

Google is strengthening online security by transitioning from SMS-based authentication codes to more secure QR codes, providing a robust defense…

Chinese Cloud Services
25
Feb
2025

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

Various industrial organizations in the Asia-Pacific (APAC) region have been targeted as part of phishing attacks designed to deliver a…

Rethinking the route to net zero
25
Feb
2025

Rethinking the route to net zero

Thank you for joining! Access your Pro+ Content below. 25 February 2025 Rethinking the route to net zero Share this…

Critical RCE Vulnerability in MITRE Caldera – Proof of Concept Released
25
Feb
2025

Critical RCE Vulnerability in MITRE Caldera – Proof of Concept Released

A critical remote code execution (RCE) vulnerability has been uncovered in MITRE Caldera, a widely used adversarial emulation framework. The…