Author: Cybernoz

Now Targets 1,030 Sites and 73 Financial Institutions
03
Feb
2025

Now Targets 1,030 Sites and 73 Financial Institutions

Feb 03, 2025Ravie LakshmananFinancial Security / Malware Brazilian Windows users are the target of a campaign that delivers a banking…

Elon Musk ’s DOGE team granted ‘full access’ to sensitive Treasury systems. What are the risks?
03
Feb
2025

Elon Musk ’s DOGE team granted ‘full access’ to sensitive Treasury systems. What are the risks?

Elon Musk ’s DOGE team granted ‘full access’ to sensitive Treasury systems. What are the risks? Pierluigi Paganini February 03,…

PyPI
03
Feb
2025

PyPI adds project archiving system to stop malicious updates

The Python Package Index (PyPI) has announced the introduction of ‘Project Archival,’ a new system that allows publishers to archive…

ChatGPT Announces Deep Research That Handles Complex Tasks Faster Than Humans
03
Feb
2025

ChatGPT Announces Deep Research That Handles Complex Tasks Faster Than Humans

OpenAI has introduced an innovative feature for ChatGPT called “Deep Research,” designed to handle complex, multi-step research tasks with exceptional…

Emerging Malicious SMS Platform Powering Phishing Attacks
03
Feb
2025

Emerging Malicious SMS Platform Powering Phishing Attacks

In the ever-evolving landscape of cybercrime, bulk SMS platforms like Devil-Traff have emerged as powerful tools for phishing campaigns, exploiting…

Alibaba Cloud Storage Service Vulnerability Allows Unauthorized Data Uploads
03
Feb
2025

Alibaba Cloud Storage Service Vulnerability Allows Unauthorized Data Uploads

A significant security vulnerability has been discovered in Alibaba Cloud Object Storage Service (OSS), enabling unauthorized users to upload data…

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry
03
Feb
2025

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

The Indonesian hacker group “INDOHAXSEC” has allegedly breached the National Tuberculosis Registry (NTBR) of Malaysia, managed by the Ministry of…

Human Body of Cybersecurity
03
Feb
2025

How Every Part Plays A Role

Understanding cybersecurity can sometimes feel like steering a maze of technical terms and complex systems. But a recent infographic shared…

APT37 Hackers Abusing Group Chats To Attack Via Malicious LNK File
03
Feb
2025

APT37 Hackers Abusing Group Chats To Attack Via Malicious LNK File

The North Korean state-sponsored hacking group APT37 (aka ScarCruft, Reaper), has been identified leveraging group chat platforms to distribute malicious…

DeepSeek-R1 more readily generates dangerous content than other large language models
03
Feb
2025

DeepSeek-R1 more readily generates dangerous content than other large language models

DeepSeek, the rapidly growing generative artificial intelligence (GenAI) model that made waves around the world at the end of January…

Threat Replay Testing: Turning Attackers into Pen Testers
03
Feb
2025

Threat Replay Testing: Turning Attackers into Pen Testers

In war, as Sun Tzu taught us, the better you understand your enemy’s tactics (and yourself), the better equipped you…

Linux 6.14 Released - 500,000 Lines of Code Modified
03
Feb
2025

Linux 6.14 Released – 500,000 Lines of Code Modified

Linus Torvalds, the creator of the Linux kernel, has announced the release of Linux 6.14-rc1, marking the end of the…