Author: Cybernoz

The Internet of Things Design Challenges
23
Apr
2025

The Internet of Things Design Challenges

Developing an engineering project is a challenge by itself. In the practice, dealing with some product or service is very…

Russia
23
Apr
2025

Russian army targeted by new Android malware hidden in mapping app

A new Android malware has been discovered hidden inside trojanized versions of the Alpine Quest mapping app, which is reportedly used…

Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds
23
Apr
2025

Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds

Significant vulnerabilities in popular browser-based cryptocurrency wallets enable attackers to steal funds without any user interaction or approval.  These critical…

TRON Phishing Attack
23
Apr
2025

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

Apr 23, 2025Ravie LakshmananMalware / Cryptocurrency Multiple threat activity clusters with ties to North Korea (aka Democratic People’s Republic of…

Crypto mining campaign targets Docker environments with new evasion technique
23
Apr
2025

Crypto mining campaign targets Docker environments with new evasion technique

Crypto mining campaign targets Docker environments with new evasion technique Pierluigi Paganini April 23, 2025 New malware campaign targets Docker…

A seal reading "Department of Justice Federal Bureau of Investigation" is displayed on the J. Edgar Hoover FBI building in Washington, DC, on August 9, 2022.
23
Apr
2025

10 key numbers from the 2024 FBI IC3 report

It looks like 2024 was a record year in cybercrime for all the wrong reasons, according to the FBI’s annual…

WhatsApp
23
Apr
2025

WhatsApp’s new Advanced Chat Privacy protects sensitive messages

WhatsApp has introduced a new Advanced Chat Privacy feature to protect sensitive information exchanged in private chats and group conversations….

Synology Network File System Vulnerability Let Read Any File
23
Apr
2025

Synology Network File System Vulnerability Let Read Any File

A severe security vulnerability in Synology’s DiskStation Manager (DSM) software has been identified. This vulnerability allows remote attackers to read…

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations
23
Apr
2025

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat actors, identified as UTA0352 and…

State Department reorganization could imperil cyber diplomacy
23
Apr
2025

State Department reorganization could imperil cyber diplomacy

The Trump administration’s plan to overhaul the State Department for the modern era could halt the U.S.’s recent progress on…

Push phishing attack header
23
Apr
2025

Why most attacks feel like a zero day

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software…

Ripple XPRL Official NPM Package Hijacked To Inject Private Key Stealing Malware
23
Apr
2025

Ripple XPRL Official NPM Package Hijacked To Inject Private Key Stealing Malware

A significant supply chain attack targeting cryptocurrency users. The official XRPL (Ripple) NPM package, which serves as the JavaScript SDK…