Author: Cybernoz

Apple
14
Nov
2025

Your passport, now on your iPhone. Helpful or risky?

Apple has launched Digital ID, a way for users in the US to create and present a government-issued ID in Apple…

Android
14
Nov
2025

Google backpedals on new Android developer registration rules

Google is backpedaling on its decision to introduce new identity verification rules for all developers, stating that it will also…

Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years
14
Nov
2025

Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Security researcher Paul McCarty uncovered a significant coordinated spam campaign targeting the npm ecosystem. The IndonesianFoods worm, as it has…

Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques
14
Nov
2025

Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques

A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the importance of analyzing more…

Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
14
Nov
2025

Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns

Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date….

Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
14
Nov
2025

Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands

Cisco has released security updates to address two critical vulnerabilities in Unified Contact Center Express (Unified CCX) that could allow…

Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques
14
Nov
2025

Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques

Researchers at Group-IB have uncovered a sophisticated phishing framework that demonstrates how cybercriminals are industrializing credential theft through automation, evasion…

Top 100 Cybersecurity Leaders In The U.S. Announced
14
Nov
2025

Top 100 Cybersecurity Leaders In The U.S. Announced

To recognize the individuals driving the transformation of cybersecurity in the United States, The Cyber Express, in collaboration with Suraksha…

Robert Rea
14
Nov
2025

The retail sector needs a cybersecurity talent incubator

Retail giants have a target on their backs. Hackers are picking them apart at a rate rarely seen in other…

Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover
14
Nov
2025

Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover

A deceptive Chrome extension named Safery: Ethereum Wallet has emerged as a serious threat to cryptocurrency users. Published on the…

Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
14
Nov
2025

Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments

Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants…

Automated Cyber Espionage Campaign
14
Nov
2025

Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part…