Author: Cybernoz

Defence vacates Global Switch a year ahead of lease expiry
27
Feb
2025

Defence vacates Global Switch a year ahead of lease expiry – Cloud – Hardware – Storage

Defence has completed its withdrawal from Global Switch Australia’s data centres a year ahead of its lease expiry, iTnews can…

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations
27
Feb
2025

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia, targeting a prominent real estate…

How to Use Slack for Business: Workplace Communication
27
Feb
2025

How to Use Slack for Business: Workplace Communication

Do you want to have the best communication system at your workplace? Learn how to maximize the benefits of Slack…

Services Australia describes fraud, debt-related machine learning use cases
27
Feb
2025

Services Australia describes fraud, debt-related machine learning use cases – Security – Software

Services Australia is trialling machine learning to detect potential instances of identity theft affecting Centrelink customers, with the goal of…

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details
27
Feb
2025

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in social media, marketing, and related…

New Backdoor Auto-color Linux Targets Systems in US and Asia
27
Feb
2025

New Backdoor Auto-color Linux Targets Systems in US and Asia

Auto-color: New Linux backdoor malware targeting the US and Asia. Learn about its advanced evasion, persistence, and detection methods. A…

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited
27
Feb
2025

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of legitimate businesses, according to the…

North Korea-linked TraderTraitor is responsible for $1.5 Billion Bybit hack
27
Feb
2025

North Korea-linked TraderTraitor is responsible for $1.5 Billion Bybit hack

FBI: North Korea-linked TraderTraitor is responsible for $1.5 Billion Bybit hack Pierluigi Paganini February 27, 2025 The FBI confirmed that…

Access management system
27
Feb
2025

Over 49,000 misconfigured building access systems exposed online

Researchers discovered 49,000 misconfigured and exposed Access Management Systems (AMS) across multiple industries and countries, which could compromise privacy and…

Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2
27
Feb
2025

Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed “Squidoor,” has emerged as a sophisticated threat targeting government, defense, telecommunications, education, and aviation sectors…

'Positive steps' in redress for Post Office Capture victims
27
Feb
2025

‘Positive steps’ in redress for Post Office Capture victims

The law firm representing 100 former subpostmasters who suffered the life-changing effects of being blamed for unexplained shortfalls on the…

AI-generated face
27
Feb
2025

Microsoft names cybercriminals behind AI deepfake network

Microsoft has named multiple threat actors part of a cybercrime gang accused of developing malicious tools capable of bypassing generative…