Author: Cybernoz

Beware of Malicious Browser Updates That Installs SocGholish Malware
16
Feb
2025

Beware of Malicious Browser Updates That Installs SocGholish Malware

Cyber threats have evolved significantly in recent years, with malicious actors employing sophisticated tactics to compromise user systems. One such…

North Korean IT Workers Infiltrate International Companies To Plant Backdoors on Systems
16
Feb
2025

North Korean IT Workers Infiltrate International Companies To Plant Backdoors on Systems

North Korean IT workers have been infiltrating international companies by securing remote positions under false identities. This tactic not only…

Lazarus Group Using New Malware Tactic To Attack Developers Globally
16
Feb
2025

Lazarus Group Using New Malware Tactic To Attack Developers Globally

The notorious Lazarus Group in a recent escalation of cyber threats linked to North Korea, has unveiled a sophisticated new…

Week in review: Microsoft fixes two actively exploited 0-days, PAN-OS auth bypass hole plugged
16
Feb
2025

Week in review: Microsoft fixes two actively exploited 0-days, PAN-OS auth bypass hole plugged

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes two actively exploited…

EarthKapre APT Drops Weaponized PDF to Compromise Windows Systems
16
Feb
2025

EarthKapre APT Drops Weaponized PDF to Compromise Windows Systems

A highly sophisticated cyber espionage group known as EarthKapre, also referred to as RedCurl, has been identified targeting private-sector organizations,…

XELERA Ransomware Attacking Job Seekers With Weaponized Word Documents
16
Feb
2025

XELERA Ransomware Attacking Job Seekers With Weaponized Word Documents

Job seekers have become the target of a sophisticated ransomware campaign in a recent cybersecurity threat, and this campaign dubbed…

Lazarus Group Infostealer Malwares Attacking Developers In New Campaign
16
Feb
2025

Lazarus Group Infostealer Malwares Attacking Developers In New Campaign

The notorious Lazarus Group, a North Korean Advanced Persistent Threat (APT) group, has been linked to a sophisticated campaign targeting…

Elon Musk's DOGE Website Database Vulnerability Let Anyone Make Entries Directly
16
Feb
2025

Elon Musk’s DOGE Website Database Vulnerability Let Anyone Make Entries Directly

A website launched by Elon Musk’s Department of Government Efficiency (DOGE) has been found to have a significant security vulnerability,…

Beware of Fake BSOD Delivered by Malicious Python Script
16
Feb
2025

Beware of Fake BSOD Delivered by Malicious Python Script

A recently discovered Python script has been flagged as a potential cybersecurity threat due to its use of a clever…

New Go-Based Malware Exploits Telegram and Use It as C2 Channel
16
Feb
2025

New Go-Based Malware Exploits Telegram and Use It as C2 Channel

Researchers have identified a new backdoor malware, written in Go programming language, that leverages Telegram as its command-and-control (C2) channel….

SonicWall Firewall Authentication Bypass Vulnerability Exploited in Wild
16
Feb
2025

SonicWall Firewall Authentication Bypass Vulnerability Exploited in Wild

A critical authentication bypass vulnerability in SonicWall firewalls, tracked as CVE-2024-53704, is now being actively exploited in the wild, cybersecurity…

AI Orchestration
16
Feb
2025

We have Enough AI for AGI

I wrote recently about the difference between Functional and Technical AGI. I argued that Technical AGI is the real deal…