Author: Cybernoz

Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
22
Sep
2025

Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments

In recent weeks, security researchers have observed a surge in attacks exploiting Oracle Database Scheduler’s External Jobs feature to gain…

Teen charged with Las Vegas casino cyber heist
22
Sep
2025

Teen charged with Las Vegas casino cyber heist

A teenage boy suspected of involvement in the Scattered Spider cyber attacks on two major Las Vegas casino operators, Caesars…

Flights across Europe delayed after cyberattack targets third-party vendor
22
Sep
2025

Flights across Europe delayed after cyberattack targets third-party vendor

A cyberattack targeting a third-party technology vendor has disrupted passenger flights at major international airports across Europe, including Heathrow Airport…

Windows
22
Sep
2025

New EDR-Freeze tool uses Windows WER to suspend security software

A new method and proof-of-concept tool called EDR-Freeze demonstrates that evading security solutions is possible from user mode with Microsoft’s…

New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection
22
Sep
2025

New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection

Attackers increasingly exploit Microsoft Exchange inbox rules to maintain persistence and exfiltrate data within enterprise environments.  A newly released tool,…

AI-powered vulnerability detection will make things worse, not better, former US cyber official warns
22
Sep
2025

AI-powered vulnerability detection will make things worse, not better, former US cyber official warns

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. WASHINGTON — Cybersecurity…

LastPass: Fake password managers infect Mac users with malware
22
Sep
2025

Fake password managers infect Mac users with malware

LastPass is warning users of a campaign that targets macOS users with malicious software impersonating popular products delivered through fraudulent…

Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials
22
Sep
2025

Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials

A sophisticated Iran-nexus espionage group known as Subtle Snail has emerged as a significant threat to European telecommunications, aerospace, and…

Bitcoin continues to increase its institutional popularity 
22
Sep
2025

Bitcoin continues to increase its institutional popularity 

Not long ago, the mere idea that cryptocurrencies could ever be integrated into mainstream finance would have seemed like a…

ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks
22
Sep
2025

ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented…

Researchers warn VoidProxy phishing platform can bypass MFA
22
Sep
2025

Social engineering campaigns highlight the ability to exploit human behavior

The recent wave of social engineering attacks highlights the risks of how a sophisticated threat group can take advantage of…

Firefox
22
Sep
2025

Mozilla now lets Firefox add-on devs roll back bad updates

Mozilla has announced a new feature that enables Firefox extension developers to roll back to previously approved versions, allowing them…