Author: Cybernoz

New Backdoor Auto-color Linux Targets Systems in US and Asia
27
Feb
2025

New Backdoor Auto-color Linux Targets Systems in US and Asia

Auto-color: New Linux backdoor malware targeting the US and Asia. Learn about its advanced evasion, persistence, and detection methods. A…

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited
27
Feb
2025

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of legitimate businesses, according to the…

North Korea-linked TraderTraitor is responsible for $1.5 Billion Bybit hack
27
Feb
2025

North Korea-linked TraderTraitor is responsible for $1.5 Billion Bybit hack

FBI: North Korea-linked TraderTraitor is responsible for $1.5 Billion Bybit hack Pierluigi Paganini February 27, 2025 The FBI confirmed that…

Access management system
27
Feb
2025

Over 49,000 misconfigured building access systems exposed online

Researchers discovered 49,000 misconfigured and exposed Access Management Systems (AMS) across multiple industries and countries, which could compromise privacy and…

Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2
27
Feb
2025

Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed “Squidoor,” has emerged as a sophisticated threat targeting government, defense, telecommunications, education, and aviation sectors…

'Positive steps' in redress for Post Office Capture victims
27
Feb
2025

‘Positive steps’ in redress for Post Office Capture victims

The law firm representing 100 former subpostmasters who suffered the life-changing effects of being blamed for unexplained shortfalls on the…

AI-generated face
27
Feb
2025

Microsoft names cybercriminals behind AI deepfake network

Microsoft has named multiple threat actors part of a cybercrime gang accused of developing malicious tools capable of bypassing generative…

New Wi-Fi Jamming Attack Disables Targeted Wi-Fi Devices Using RIS Technology
27
Feb
2025

New Wi-Fi Jamming Attack Disables Targeted Wi-Fi Devices Using RIS Technology

A major development in wireless security research has revealed a sophisticated Wi-Fi jamming technique capable of disabling individual devices with…

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications
27
Feb
2025

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been identified leveraging legitimate cloud services…

Hackers Impersonate Taiwan’s Tax Authority to Deploy Winos 4.0 Malware
27
Feb
2025

Hackers Impersonate Taiwan’s Tax Authority to Deploy Winos 4.0 Malware

FortiGuard Labs discovers Winos 4.0 malware targeting Taiwan via phishing. Learn how this advanced threat steals data and how to…

Naveen Goud
27
Feb
2025

SIGNAL denies access to user data in Sweden, reverse of what Apple has done

SIGNAL, the encrypted messaging platform based in California, USA, has made a significant announcement regarding its plans to exit Sweden….

Secure software: Third-party suppliers your first-party risk
27
Feb
2025

Secure software: Third-party suppliers your first-party risk

In 1965, Ralph Nader’s groundbreaking book Unsafe at Any Speed exposed how car manufacturers prioritised style, performance, and profit over…