Author: Cybernoz

Hacker in a parking garage
09
Mar
2025

US cities warn of wave of unpaid parking phishing texts

US cities are warning of an ongoing mobile phishing campaign pretending to be texts from the city’s parking violation departments about…

Undocumented hidden feature found in Espressif ESP32 microchip
09
Mar
2025

Undocumented hidden feature found in Espressif ESP32 microchip

Undocumented hidden feature found in Espressif ESP32 microchip Pierluigi Paganini March 09, 2025 Experts discovered an undocumented hidden feature in…

Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs
09
Mar
2025

Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work…

Akira ransomware gang used unsecured webcam to bypass EDR
09
Mar
2025

Akira ransomware gang used unsecured webcam to bypass EDR

Akira ransomware gang used an unsecured webcam to bypass EDR Pierluigi Paganini March 08, 2025 The Akira ransomware gang exploited…

NTT suffered a data breach that impacted 18,000 companies
08
Mar
2025

NTT suffered a data breach that impacted 18,000 companies

Japanese telecom giant NTT suffered a data breach that impacted 18,000 companies Pierluigi Paganini March 08, 2025 A data breach…

Kill switch
08
Mar
2025

Developer guilty of using kill switch to sabotage employer’s systems

A software developer has been found guilty of sabotaging his ex-employer’s systems by running custom malware and installing a “kill switch”…

ESP32
08
Mar
2025

Undocumented backdoor found in Bluetooth chip used by a billion devices

The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains…

YouTube
08
Mar
2025

YouTubers extorted via copyright strikes to spread malware

Cybercriminals are sending bogus copyright claims to YouTubers to coerce them into promoting malware and cryptocurrency miners on their videos….

What Happens When Push Notifications Go Malicious? A Storm of Scams Awaits
08
Mar
2025

What Happens When Push Notifications Go Malicious?

Push notifications are a common feature that many websites use to keep users engaged. However, what happens when these notifications…

Jane Devry
08
Mar
2025

They’re Not Hacking Your Systems, They’re Hacking Your People: The AI-Powered Crisis We’re Ignoring

Business executives never think they’ll be victims of a cyberattack until it happens to them—and by that point, it’s already…

Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets
08
Mar
2025

Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets

As Donald Trump’s administration continues its relentless reorganization of the United States federal government, documents obtained by WIRED showed this…

Jane Devry
08
Mar
2025

AI and Automation: Key Pillars for Building Cyber Resilience

AI applications are embedded in our phones and becoming a vital part of life. To accelerate mainstream adoption, technology companies…