Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

  • Home
  • Toolkit
  • About
  • Services
  • Cybersecurity News
  • Contact
  • Facebook
  • X
  • LinkedIn
  • Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

    Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain

    November 13, 2025
    Cyber News

    Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate users’ seed phrases. The name of the extension is “Safery: Ethereum Wallet,” with the threat actor describing it as a “secure wallet for managing Ethereum cryptocurrency with flexible settings.” It was uploaded to the Chrome…

  • Microsoft Exchange ‘Under Imminent Threat’, Act Now

    Microsoft Exchange ‘Under Imminent Threat’, Act Now

    November 12, 2025
    Cyber News

    Threats against Microsoft Exchange continue to mount, but there are steps both organizations and Microsoft can take. ​ ​ ​Read More

  • Phishing Tool Uses Smart Redirects to Bypass Detection

    Phishing Tool Uses Smart Redirects to Bypass Detection

    November 12, 2025
    Cyber News

    A campaign against Microsoft 365 users leverages Quantum Route Redirection, which simplifies previously technical attack steps and has affected victims across 90 countries. ​ ​ ​Read More

  •  Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

     Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

    November 12, 2025
    Cyber News

    Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are behind a massive Phishing-as-a-Service (PhaaS) platform called Lighthouse that has ensnared over 1 million users across 120 countries. The PhaaS kit is used to conduct large-scale SMS phishing attacks that exploit…

  • Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

    Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

    November 12, 2025
    Cyber News

    Amazon’s threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two then-zero-day security flaws in Cisco Identity Service Engine (ISE) and Citrix NetScaler ADC products as part of attacks designed to deliver custom malware. “This discovery highlights the trend of threat actors focusing on critical identity and network access control…

  • [Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR

    [Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR

    November 12, 2025
    Cyber News

    Every day, security teams face the same problem—too many risks, too many alerts, and not enough time. You fix one issue, and three more show up. It feels like you’re always one step behind. But what if there was a smarter way to stay ahead—without adding more work or stress? Join The Hacker News and…

  • WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

    WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks

    November 11, 2025
    Cyber News

    Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program dubbed Maverick that has been propagated via WhatsApp. According to a report from CyberProof, both malware strains are written in .NET, target Brazilian users and banks, and feature identical functionality to decrypt, targeting banking URLs and monitor banking…

  • GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

    GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

    November 11, 2025
    Cyber News

    The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress. The cybersecurity company said it observed three GootLoader infections since October 27, 2025, out of which two resulted in hands-on keyboard intrusions with domain controller compromise taking place within 17 hours…

  • Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity

    Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity

    November 11, 2025
    Cyber News

    Cybercriminals are weaponizing AI voice cloning and publicly available data to craft social engineering scams that emotionally manipulate senior citizens—and drain billions from their savings. ​ ​ ​Read More

  • Bridging the Skills Gap: How Military Veterans Are Strengthening Cybersecurity

    Bridging the Skills Gap: How Military Veterans Are Strengthening Cybersecurity

    November 11, 2025
    Cyber News

    From intelligence analysts to surface warfare officers, military veterans of all backgrounds are successfully pivoting to cybersecurity careers and strengthening the industry’s defense capabilities. ​ ​ ​Read More

Previous Page
1 … 12 13 14 15 16 … 45
Next Page
Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Privacy Policy

  • Facebook
  • X
  • LinkedIn