Author: Cybernoz

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks
17
Feb
2025

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks

Telekom Security has recently uncovered a significant vishing (voice phishing) campaign targeting individuals and organizations across Germany. This operation appears…

Naveen Goud
17
Feb
2025

Akira Ransomware is now targeting legacy servers of defunct companies

In a disturbing yet intriguing development, cyber criminals have once again demonstrated their capacity to target organizations with the sole…

Unlocking OSINT: Top books to learn from
17
Feb
2025

Unlocking OSINT: Top books to learn from

Discover the top Open-Source Intelligence (OSINT) books in this curated list. From investigative techniques to digital footprint analysis, these titles…

AI-driven personalisation appealing to UK shoppers, says research
17
Feb
2025

AI-driven personalisation appealing to UK shoppers, says research

Almost a third of shoppers in the UK have said that personalisation assisted by artificial intelligence (AI) increases their loyalty…

Finastra
17
Feb
2025

Fintech giant Finastra notifies victims of October data breach

Financial technology giant Finastra is notifying victims of a data breach after their personal information was stolen by unknown attackers…

Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection
17
Feb
2025

Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection

New research reveals ransomware gangs are accelerating encryption timelines while adopting advanced evasion techniques and data extortion strategies. A 2025…

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects
17
Feb
2025

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking its first update since 2022. This…

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB
17
Feb
2025

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks to credential theft…

Hackers Exploit Telegram API to Spread New Golang Backdoor
17
Feb
2025

Hackers Exploit Telegram API to Spread New Golang Backdoor

The new Golang backdoor uses Telegram for command and control. Netskope discovers malware that exploits Telegram’s API for malicious purposes….

Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely
17
Feb
2025

Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely

A sophisticated malware campaign has recently been uncovered by security researchers at Sucuri, targeting WordPress websites through hidden malware and…

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection
17
Feb
2025

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between initial system compromise and the deployment…

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
17
Feb
2025

A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)

The suspected Chinese state-sponsored hackers who breached workstations of several US Treasury employees in December 2024 did so by leveraging…