Author: Cybernoz

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads
31
Oct
2025

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free and open-source Command and Control…

WhatsApp Implements Passkey System to Boost Backup Privacy
31
Oct
2025

WhatsApp Implements Passkey System to Boost Backup Privacy

WhatsApp has announced a significant security upgrade that makes protecting your chat backups simpler and more secure than ever before….

BadCandy
31
Oct
2025

Hundreds Of Australian Devices Compromised With BadCandy Implant

BadCandy, a Persistent Access Threat to Network Edge Devices BadCandy is a Lua-based web shell implant deployed on compromised Cisco…

Hacker
31
Oct
2025

Ukrainian extradited from Ireland on Conti ransomware charges

A Ukrainian national believed to be a member of the Conti ransomware operation has been extradited to the United States…

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access
31
Oct
2025

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea’s regime have demonstrated continued technical sophistication by introducing advanced malware toolsets…

Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads
31
Oct
2025

Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads

Threat intelligence researchers have uncovered a growing campaign where cybercriminals are weaponizing AdaptixC2, a legitimate open-source Command and Control framework…

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
31
Oct
2025

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

Oct 31, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA),…

India’s Cybersecurity Grows To $20B: CERT-In, MeitY Lead
31
Oct
2025

India’s Cybersecurity Grows To $20B: CERT-In, MeitY Lead

India’s cybersecurity landscape is witnessing rapid growth, with the Indian Computer Emergency Response Team (CERT-In) playing a central role in driving this transformation. According…

Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications
31
Oct
2025

Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications

Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications Pierluigi Paganini October 31, 2025 A nation-state actor, likely a China-nexus…

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
31
Oct
2025

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability

Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target European diplomatic entities across Hungary,…

How to Hack a Poker Game
31
Oct
2025

How to Hack a Poker Game

Michael Calore: Yeah. My favorite indiscreet product placement was in the show Entourage from HBO. It was on TV, I…

Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw
31
Oct
2025

Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw

Progress Software has released security patches to address a high-severity vulnerability in its MOVEit Transfer platform discovered on October 29,…