Author: Cybernoz

GHOSTR Hacker Linked to 90+ Data Breaches Arrested
28
Feb
2025

GHOSTR Hacker Linked to 90+ Data Breaches Arrested

A coordinated effort between law enforcement in Thailand, Singapore, and cybersecurity firm Group-IB has led to the arrest of a…

Android
28
Feb
2025

Vo1d malware botnet grows to 1.6 million Android TVs worldwide

A new variant of the Vo1d malware botnet has grown to 1,590,299 infected Android TV devices across 226 countries, recruiting…

FBI says North Korea was responsible for US$1.5 billion ByBit hack
28
Feb
2025

FBI says North Korea was responsible for US$1.5 billion ByBit hack – Security

The Federal Bureau of Investigation said that North Korea was responsible for the theft of approximately US$1.5 billion ($2.4 billion)…

France
28
Feb
2025

Privacy tech firms warn France’s encryption and VPN laws threaten privacy

Privacy-focused email provider Tuta (previously Tutanota) and the VPN Trust Initiative (VTI) are raising concerns over proposed laws in France set…

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections
28
Feb
2025

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that exploits a legitimate antivirus driver…

Defence vacates Global Switch a year ahead of lease expiry
27
Feb
2025

Defence vacates Global Switch a year ahead of lease expiry – Cloud – Hardware – Storage

Defence has completed its withdrawal from Global Switch Australia’s data centres a year ahead of its lease expiry, iTnews can…

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations
27
Feb
2025

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia, targeting a prominent real estate…

How to Use Slack for Business: Workplace Communication
27
Feb
2025

How to Use Slack for Business: Workplace Communication

Do you want to have the best communication system at your workplace? Learn how to maximize the benefits of Slack…

Services Australia describes fraud, debt-related machine learning use cases
27
Feb
2025

Services Australia describes fraud, debt-related machine learning use cases – Security – Software

Services Australia is trialling machine learning to detect potential instances of identity theft affecting Centrelink customers, with the goal of…

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details
27
Feb
2025

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in social media, marketing, and related…

New Backdoor Auto-color Linux Targets Systems in US and Asia
27
Feb
2025

New Backdoor Auto-color Linux Targets Systems in US and Asia

Auto-color: New Linux backdoor malware targeting the US and Asia. Learn about its advanced evasion, persistence, and detection methods. A…

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited
27
Feb
2025

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of legitimate businesses, according to the…