Author: Cybernoz

Apache Tika Core Flaw Allows Attackers to Exploit Systems with Malicious PDF Uploads
05
Dec
2025

Apache Tika Core Flaw Allows Attackers to Exploit Systems with Malicious PDF Uploads

A newly disclosed critical vulnerability in Apache Tika could allow attackers to compromise servers by simply uploading a malicious PDF file, according to…

Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
05
Dec
2025

Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch

Dec 05, 2025Ravie LakshmananApplication Security / Vulnerability A critical security flaw has been disclosed in Apache Tika that could result…

Intigriti insights: React2Shell CVE-2025-55182 | Intigriti
05
Dec
2025

Intigriti insights: React2Shell CVE-2025-55182 | Intigriti

This blog explores the widespread and critical state of the React2Shell vulnerability. It provides a technical overview, suggested mitigations, and…

China-nexus actor targets multiple US entities with Brickstorm malware
05
Dec
2025

China-nexus actor targets multiple US entities with Brickstorm malware

A China-nexus threat actor hacked into VMware vCenter environments at U.S.-based companies before deploying Brickstorm malware, security firm CrowdStrike warned…

FBI
05
Dec
2025

FBI warns of virtual kidnapping scams using altered social media photos

The FBI warns that criminals are altering images shared on social media and using them as fake proof of life…

Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing
05
Dec
2025

Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing

Madison, United States, December 5th, 2025, CyberNewsWire Sprocket Security is proud to announce that it has once again been recognized…

MuddyWater Hackers Use UDPGangster Backdoor to Bypass Network Defenses on Windows
05
Dec
2025

MuddyWater Hackers Use UDPGangster Backdoor to Bypass Network Defenses on Windows

The MuddyWater threat group has escalated its cyber espionage operations by deploying UDPGangster, a sophisticated UDP-based backdoor designed to infiltrate…

One-Person Production: Wondershare Filmora V15 Empowers Solo Creators With AI
05
Dec
2025

Wondershare Filmora V15 Empowers Solo Creators With AI – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Creative independence is reshaping how people tell their stories. Today, more creators are taking control of their own production from…

Cloudflare fixes second outage in a month
05
Dec
2025

Cloudflare fixes second outage in a month

Cloudflare has successfully recovered its services after a second outage in the space of three weeks briefly took down Cloudflare…

Why identity is critical to improving cybersecurity posture
05
Dec
2025

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs. 04 Dec 2025  •  , 4…

Threat Actors Deploying CoinMiner Malware via USB Drives Infecting Workstations
05
Dec
2025

Threat Actors Deploying CoinMiner Malware via USB Drives Infecting Workstations

Cybercriminals are actively spreading CoinMiner malware through USB drives, targeting workstations across South Korea to mine Monero cryptocurrency. This ongoing…

Threat Actors Distribute CoinMiner Malware through USB Drives to Infect Workstations
05
Dec
2025

Threat Actors Distribute CoinMiner Malware through USB Drives to Infect Workstations

Cybercriminals continue to exploit USB drives as infection vectors, with recent campaigns delivering sophisticated CoinMiner malware that establishes persistent cryptocurrency-mining…