Author: Cybernoz

Zloader Malware Used as Gateway for Ransomware Deployment in Corporate Networks
23
Sep
2025

Zloader Malware Used as Gateway for Ransomware Deployment in Corporate Networks

Zloader, a sophisticated Zeus-based modular trojan that first emerged in 2015, has undergone a significant transformation from its original banking-focused…

Inc Ransomware Group Claims 5.7 TB Theft from Pennsylvania Attorney General’s Office
23
Sep
2025

Inc Ransomware Claims 5.7 TB of Data Theft at Pennsylvania Attorney General

The notorious Inc ransomware group has taken responsibility for an August 2025 data breach at the Pennsylvania Attorney General’s office….

Blackdot Videris Automate uses AI to speed OSINT, risk detection, and decision-making
23
Sep
2025

Blackdot Videris Automate uses AI to speed OSINT, risk detection, and decision-making

Blackdot Solutions unveiled Videris Automate, a platform that delivers new AI capabilities to automate investigations and screening processes. The launch…

Widening Middle Eastern war increases cyber risk
23
Sep
2025

‘Our worst day’: The untold story of the Electoral Commission cyber attack

Your worst day can begin so innocuously – you leave home, you stop to pick up your coffee order, you…

Top 25 MPC Vulnerabilities
23
Sep
2025

Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited

MCP has become an integral part of the expansion of agentic AI but comes with its own vulnerabilities. Model Context…

$150K awarded for L1TF Reloaded exploit that bypasses cloud mitigations
23
Sep
2025

$150K awarded for L1TF Reloaded exploit that bypasses cloud mitigations

$150K awarded for L1TF Reloaded exploit that bypasses cloud mitigations Pierluigi Paganini September 23, 2025 Researchers earned $150K for “L1TF…

npm
23
Sep
2025

NPM package caught using QR Code to fetch cookie-stealing malware

Newly discovered npm package ‘fezbox’ employs QR codes to retrieve cookie-stealing malware from the threat actor’s server. The package, masquerading as a…

GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing
23
Sep
2025

GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing

Recent High-profile supply‐chain attacks have exposed critical weaknesses in package registry security, prompting GitHub to roll out a suite of…

Beware of Fake Online Speedtest Apps with Hidden JavaScript Code
23
Sep
2025

Beware of Fake Online Speedtest Apps with Hidden JavaScript Code

These fake online speedtest applications prey on users seeking to measure their internet performance, yet they harbor hidden payloads that…

Hackers Hijacking IIS Servers Using Malicious BadIIS Module to Serve Malicious Content
23
Sep
2025

Hackers Hijacking IIS Servers Using Malicious BadIIS Module to Serve Malicious Content

A sophisticated cyber campaign, dubbed “Operation Rewrite,” is actively hijacking Microsoft Internet Information Services (IIS) web servers to serve malicious…

Russia Leveraging Cyber-Attacks as a Strategic Weapon Against Key Industries in Major Nations
23
Sep
2025

Russia Leveraging Cyber-Attacks as a Strategic Weapon Against Key Industries in Major Nations

In 2024, as the Russia-Ukraine war prolongs and military and economic cooperation between North Korea and Russia deepens, cyberspace has…

How Major SOCs Achieve Early Threat Detection in 3 Steps
23
Sep
2025

How Major SOCs Achieve Early Threat Detection in 3 Steps

Every SOC leader understands that faster threat detection is better. But the difference between knowing it and building a system…