Author: Cybernoz

Yurei Ransomware Uses PowerShell to Deploy ChaCha20 File Encryption
15
Sep
2025

Yurei Ransomware Uses PowerShell to Deploy ChaCha20 File Encryption

A newly discovered ransomware group called Yurei has emerged with sophisticated encryption capabilities, targeting organizations through double-extortion tactics while leveraging…

Most enterprise AI use is invisible to security teams
15
Sep
2025

Most enterprise AI use is invisible to security teams

Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI…

Chinese Malware Attacks
15
Sep
2025

HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks

Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…

UK ICO finds students behind majority of school data breaches
15
Sep
2025

UK ICO finds students behind majority of school data breaches

UK ICO finds students behind majority of school data breaches Pierluigi Paganini September 15, 2025 UK ICO reports students caused…

Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication
15
Sep
2025

Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication

Two critical vulnerabilities have been discovered in the Linux Common Unix Printing System (CUPS), exposing millions of systems to remote…

Over 500GB of Sensitive Great Firewall of China Data Leaked Online
15
Sep
2025

Over 500GB of Sensitive Great Firewall of China Data Leaked Online

A massive data breach has exposed the inner workings of China’s internet censorship system, with over 500GB of sensitive documents…

Arkime: Open-source network analysis and packet capture system
15
Sep
2025

Arkime: Open-source network analysis and packet capture system

Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to…

VoidProxy PhaaS Targets Microsoft 365 and Google Accounts in New Campaign
15
Sep
2025

VoidProxy PhaaS Targets Microsoft 365 and Google Accounts in New Campaign

Phishing-as-a-Service operation called VoidProxy that uses advanced adversary-in-the-middle techniques to bypass traditional multi-factor authentication and steal session tokens from Microsoft…

5G Connectivity: Powering Extreme Sports Through Unmatched Wireless WAN Reliability
15
Sep
2025

5G Connectivity: Powering Extreme Sports Through Unmatched Wireless WAN Reliability

In the world of extreme sports, where split-second decisions and real-time data can define victory, reliable, high-performance connectivity is no…

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking
15
Sep
2025

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking

A new proof-of-concept (PoC) tool named BitlockMove demonstrates a novel lateral movement technique that leverages BitLocker’s Distributed Component Object Model…

A screenshot of one of the deepfake videos used to try and blackmail MPs shared in a social media post by Communications Minister Fahmi Fadzil. Photo: X/Fashmi_Fadzil
15
Sep
2025

Malaysian MPs targeted by deepfake sex video blackmail demanding US$100,000 payments

Authorities in Malaysia are hunting the suspect behind a blackmail attempt on at least 10 lawmakers who received emails demanding…

ChatGPT initially refused to create the IDs, but altering the prompt allowed hackers to bypass this restriction. Photo: AFP
15
Sep
2025

ChatGPT deepfakes military IDs for North Korean hackers, researchers find

A suspected North Korean state-sponsored hacking group used ChatGPT to create a deepfake of a military ID document to attack…