Author: Cybernoz

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications
27
Feb
2025

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been identified leveraging legitimate cloud services…

Hackers Impersonate Taiwan’s Tax Authority to Deploy Winos 4.0 Malware
27
Feb
2025

Hackers Impersonate Taiwan’s Tax Authority to Deploy Winos 4.0 Malware

FortiGuard Labs discovers Winos 4.0 malware targeting Taiwan via phishing. Learn how this advanced threat steals data and how to…

Naveen Goud
27
Feb
2025

SIGNAL denies access to user data in Sweden, reverse of what Apple has done

SIGNAL, the encrypted messaging platform based in California, USA, has made a significant announcement regarding its plans to exit Sweden….

Secure software: Third-party suppliers your first-party risk
27
Feb
2025

Secure software: Third-party suppliers your first-party risk

In 1965, Ralph Nader’s groundbreaking book Unsafe at Any Speed exposed how car manufacturers prioritised style, performance, and profit over…

CISA taps Karen Evans as executive assistant director for cybersecurity
27
Feb
2025

CISA taps Karen Evans as executive assistant director for cybersecurity

Dive Brief: The Cybersecurity and Infrastructure Security Agency confirmed that Karen Evans was named executive assistant director for cybersecurity under…

Authorities Arrested Hackers Behind 90 Data Leaks Worldwide
27
Feb
2025

Authorities Arrested Hackers Behind 90 Data Leaks Worldwide

Authorities arrested a prolific hacker responsible for over 90 data breaches across 65 organizations in the Asia-Pacific region and 25…

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware
27
Feb
2025

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618 organizations globally since June 2024, leveraging…

Jane Devry
27
Feb
2025

From Accidental Hacker to Cybersecurity Champion: The Story of Dr. Katie Paxton-Fear, Bug Bounty Hunter with HackerOne

Picture this: A young computer scientist accidentally stumbles into a live hacking event and walks away having found vulnerabilities in…

MPs grill X, TikTok and Meta about online misinformation
27
Feb
2025

MPs grill X, TikTok and Meta about online misinformation

Social media companies have defended their content moderation practices to a Parliamentary committee investigating online misinformation, arguing that they already…

Leaked ransomware chat logs reveal Black Basta’s targeted CVEs
27
Feb
2025

Leaked ransomware chat logs reveal Black Basta’s targeted CVEs

Dive Brief: Researchers analyzed leaked chat logs from the infamous Black Basta ransomware gang and found references to 62 unique…

Panda
27
Feb
2025

Belgium probes if Chinese hackers breached its intelligence service

​The Belgian federal prosecutor’s office is investigating whether Chinese hackers were behind a breach of the country’s State Security Service…

Outlook Drag-and-Drop Broken in Windows Updates
27
Feb
2025

Outlook Drag-and-Drop Broken in Windows Updates

Microsoft has addressed a significant issue affecting users of classic Outlook on devices running Windows 11, version 24H2. After installing…