Author: Cybernoz

Blockchain
18
Mar
2025

Blockchain gaming platform WEMIX hacked to steal $6.1 million

Blockchain gaming platform WEMIX suffered a cyberattack last month, allowing threat actors to steal 8,654,860 WEMIX tokens, valued at approximately…

Microsoft Warns of New StilachiRAT Stealing Remote Desktop Protocol Sessions Data
18
Mar
2025

Microsoft Warns of New StilachiRAT Stealing Remote Desktop Protocol Sessions Data

Microsoft has issued an urgent security advisory regarding a newly discovered malware strain called StilachiRAT, which specifically targets and exfiltrates…

How can Organizations Secure Low-Code No-Code Development
18
Mar
2025

How can Organizations Secure Low-Code No-Code Development

Applications developed by citizen developers are on the rise. Low-code and no-code (LCNC) platforms are reshaping the development ecosystem. These…

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT
18
Mar
2025

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,…

Analyze Mobile Threats: ANY.RUN Introduces Android OS to Its Interactive Sandbox
18
Mar
2025

ANY.RUN Introduces Android OS to Its Interactive Sandbox

With Android devices deeply embedded in business operations, it’s no surprise that cybercriminals are increasingly targeting them. Businesses are now…

How AI and automation are reshaping security leadership
18
Mar
2025

How AI and automation are reshaping security leadership

The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous…

New Sophisticated Phishing Attack Exploiting Microsoft 365 Infrastructure To Attack Users
18
Mar
2025

New Sophisticated Phishing Attack Exploiting Microsoft 365 Infrastructure To Attack Users

A sophisticated new phishing campaign has been discovered that exploits Microsoft 365’s legitimate infrastructure to conduct highly convincing credential harvesting…

AI’s Impact on Enterprise Security and How CISOs Should Prepare
18
Mar
2025

AI’s Impact on Enterprise Security and How CISOs Should Prepare

As Artificial Intelligence starts touching each aspect of every enterprise, let us find out the implications of AI on overall…

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds
18
Mar
2025

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds

A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers…

Fake DeepSeek AI Installers, Websites, and Apps Spreading Malware
18
Mar
2025

Fake DeepSeek AI Installers, Websites and Apps Spreading Malware

The rise of Artificial Intelligence (AI) has undeniably transformed various sectors, with tools like ChatGPT, DeepSeek and Gemini becoming household…

Cybercrime Magazine YouTube Channel Exceeds 500,000 Subscribers
18
Mar
2025

Cybercrime Magazine YouTube Channel Exceeds 500,000 Subscribers

18 Mar Cybercrime Magazine YouTube Channel Exceeds 500,000 Subscribers Posted at 09:29h in Blogs by Taylor Fox This week in…

New Ad Fraud Campaign
18
Mar
2025

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

Mar 18, 2025Ravie LakshmananAd Fraud / Mobile Security Cybersecurity researchers have warned about a large-scale ad fraud campaign that has…