Author: Cybernoz

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking
15
Sep
2025

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking

A new proof-of-concept (PoC) tool named BitlockMove demonstrates a novel lateral movement technique that leverages BitLocker’s Distributed Component Object Model…

A screenshot of one of the deepfake videos used to try and blackmail MPs shared in a social media post by Communications Minister Fahmi Fadzil. Photo: X/Fashmi_Fadzil
15
Sep
2025

Malaysian MPs targeted by deepfake sex video blackmail demanding US$100,000 payments

Authorities in Malaysia are hunting the suspect behind a blackmail attempt on at least 10 lawmakers who received emails demanding…

ChatGPT initially refused to create the IDs, but altering the prompt allowed hackers to bypass this restriction. Photo: AFP
15
Sep
2025

ChatGPT deepfakes military IDs for North Korean hackers, researchers find

A suspected North Korean state-sponsored hacking group used ChatGPT to create a deepfake of a military ID document to attack…

Beyond Bank levels up frontline ops with refined data strategy
15
Sep
2025

Beyond Bank levels up frontline ops with refined data strategy

Beyond Bank is advancing a data strategy to give frontline staff real-time insights to respond faster and with more personalisation…

Beyond Buzzwords: The Real Impact of AI on Identity Security
15
Sep
2025

Beyond Buzzwords: The Real Impact of AI on Identity Security

Artificial intelligence (AI) has become one of the most discussed technologies in recent years, often touted as the answer to…

NSW RegStar program resets as DCS exits key workstream
15
Sep
2025

NSW RegStar program resets as DCS exits key workstream

A multi-million-dollar government program to upgrade NSW’s licensing and registration systems has hit a roadblock, as the Department of Customer…

Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets
15
Sep
2025

Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets

Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a…

'WhiteCobra' floods VSCode market with crypto-stealing extensions
15
Sep
2025

‘WhiteCobra’ floods VSCode market with crypto-stealing extensions

A threat actor named WhiteCobra has targeting VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio…

15
Sep
2025

‘WhiteCobra’ floods VSCode market with crypto-stealing extensions

A threat actor named WhiteCobra has targeting VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio…

Samsung Fixes Image Parsing Vulnerability Exploited in Android Attacks
15
Sep
2025

Samsung Fixes Image Parsing Vulnerability Exploited in Android Attacks

Samsung has patched a serious security vulnerability that hackers were already using in live attacks against its Android devices. The…

FBI
15
Sep
2025

FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data

The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations’…

Windows
15
Sep
2025

Microsoft reminds of Windows 10 support ending in 30 days

On Friday, Microsoft reminded customers once again that Windows 10 will reach its end of support in 30 days, on…