Author: Cybernoz

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader
18
Sep
2025

CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader

Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs…

DSIT tells Ofcom to prepare to expand regulatory remit to include datacentres
18
Sep
2025

Plotting a path forward with VMware version 7

October 2, 2025, marks the end of general support for VMware’s version 7. After that, Broadcom won’t release any new…

PyPi
18
Sep
2025

PyPI invalidates tokens stolen in GhostAction supply chain attack

The Python Software Foundation team has invalidated all PyPI tokens stolen in the GhostAction supply chain attack in early September,…

Critical Microsoft's Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control
18
Sep
2025

Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control

A critical vulnerability in Microsoft’s Entra ID could have allowed an attacker to gain complete administrative control over any tenant…

Mapping a Future without Cyber Attacks
18
Sep
2025

Mapping a Future without Cyber Attacks

After countless attacks across a multitude of organizations, the cyber security industry has a fairly good grasp of how adversaries…

Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks
18
Sep
2025

Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks

SquareX first discovered and disclosed Last Mile Reassembly attacks at DEF CON 32 last year, warning the security community of…

Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks
18
Sep
2025

Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks

Palo Alto, California, September 18th, 2025, CyberNewsWire SquareX first discovered and disclosed Last Mile Reassembly attacks at DEF CON 32…

LinkedIn now uses your data for AI by default, opt out now!
18
Sep
2025

LinkedIn now uses your data for AI by default, opt out now!

LinkedIn is making major changes to its User Agreement and Privacy Policy, effective November 3, 2025. Among the most notable…

How CISOs Can Drive Effective AI Governance
18
Sep
2025

How CISOs Can Drive Effective AI Governance

AI’s growing role in enterprise environments has heightened the urgency for Chief Information Security Officers (CISOs) to drive effective AI…

Teen hackers charged over Scattered Spider attack on TfL
18
Sep
2025

Teen hackers charged over Scattered Spider attack on TfL

Two men, named as Owen Flowers and Thalha Jubair, have today appeared before Westminster Magistrate’s Court in connection with a…

APT28, Russia, Stegnography, CERT-UA
18
Sep
2025

APT28’s Recent Campaign Combined Steganography, Cloud C2 Into A Modular Infection Chain

APT28, the long-running actor tracked as Fancy Bear, Sofacy and Sednit, used a compact but technically sophisticated campaign that researchers…

New ‘shinysp1d3r’ Ransomware-as-a-service in Active Development to Encrypt VMware ESXi Environments
18
Sep
2025

New ‘shinysp1d3r’ Ransomware-as-a-service in Active Development to Encrypt VMware ESXi Environments

Emerging in mid-2025, the shinysp1d3r ransomware-as-a-service (RaaS) platform represents the next evolution of cloud-focused extortion tools. Unlike traditional ransomware that…