Author: Cybernoz

Over 1,500 PostgreSQL Servers Hit by Fileless Malware Attack
03
Apr
2025

Over 1,500 PostgreSQL Servers Hit by Fileless Malware Attack

A sophisticated malware campaign has compromised over 1,500 PostgreSQL servers, leveraging fileless techniques to deploy cryptomining payloads. The attack, identified…

WA Communities plans child protection CRM overhaul
03
Apr
2025

WA Communities plans child protection CRM overhaul – Security – Software

The Western Australia Department of Communities is under pressure to improve its 15-year-old child protection case management platform amid concerns…

When Will Windows Be Ready For The Desktop?
03
Apr
2025

When Will Windows Be Ready For The Desktop?

You’d think certain things would come second nature to a major OS — things like network connection handling or returning…

Hackers Exploit Cloudflare for Advanced Phishing Attacks
02
Apr
2025

Hackers Exploit Cloudflare for Advanced Phishing Attacks

A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the abuse of Cloudflare services and…

79 Arrested as Dark Web’s Largest Child Abuse Network ‘Kidflix’ Busted
02
Apr
2025

79 Arrested as Dark Web’s Largest Child Abuse Network ‘Kidflix’ Busted

In a major international crackdown, law enforcement agencies have taken down “Kidflix,” one of the largest known child sexual abuse…

Clean Energy Regulator puts APIs at centre of core tech rebuild
02
Apr
2025

Clean Energy Regulator puts APIs at centre of core tech rebuild – Cloud – Software

The Clean Energy Regulator (CER) is undertaking a multi-year transformation of its core technology and data repositories, following an API-first…

Firefox QuickSearches + Delicious Search = Godlike Powers
02
Apr
2025

Firefox QuickSearches + Delicious Search = Godlike Powers

I was looking for a bookmark of mine on delicious a moment ago and did so in a very primitive…

Verizon
02
Apr
2025

Verizon Call Filter API flaw exposed customers’ incoming call history

A vulnerability in Verizon’s Call Filter feature allowed customers to access the incoming call logs for another Verizon Wireless number through…

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers
02
Apr
2025

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing a stealthy malware loader, Emmenhtal,…

Skim Scan Card Skimmer Detector
02
Apr
2025

Skim Scan Card Skimmer Detector

Scott Schober didn’t want to have to develop Skim Scan – but after thieves stole his credit-card number at a New…

How To Use Python To Get Your External IP
02
Apr
2025

How To Use Python To Get Your External IP

I was having some issues involving losing connectivity to a system of mine due to a dynamic IP. Normally one…

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware
02
Apr
2025

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the DeepSeek LLM and popular remote desktop…