Author: Cybernoz

Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF
05
Dec
2025

Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF

A critical security vulnerability in Apache Tika has been discovered that allows attackers to compromise systems by uploading specially crafted…

Russian Calisto Hackers Target NATO Research with ClickFix Malware
05
Dec
2025

Russian Calisto Hackers Target NATO Research with ClickFix Malware

Russian intelligence-linked cyber threat actors have intensified their operations against NATO research organizations, Western defense contractors, and NGOs supporting Ukraine,…

Print Friendly, PDF & Email
05
Dec
2025

The hidden threat: rethinking cyber security with the rise of malware-free attacks

Cybercriminals rarely stand still. Every time defences plug one gap, attackers find another weakness. One of the more effective methods…

Beware of Deals, Discounts, & Data Thieves
05
Dec
2025

Here’s What GPA You Need To Study In The Cybersecurity Field

05 Dec Here’s What GPA You Need To Study In The Cybersecurity Field Posted at 08:49h in Blogs by Taylor…

Intellexa Predator
05
Dec
2025

Leaks show Intellexa burning zero-days to keep Predator spyware running

Intellexa is a well-known commercial spyware vendor, servicing governments and large corporations. Its main product is the Predator spyware. An…

JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability
05
Dec
2025

JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability

JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability Pierluigi Paganini December 05, 2025 Array Networks AG gateways have…

Hacking with Burp AI in the Chesspocalypse: API expert Corey Ball showcases how Burp AI can support pentesters. | Blog
05
Dec
2025

How to detect React2Shell with Burp Suite | Blog

Tom Ryder | 05 December 2025 at 13:53 UTC Detecting React2Shell with Burp Suite React2Shell vulnerabilities in Next.js applications are…

Russian Hackers Imitate European Events in Coordinated Phishing Campaigns
05
Dec
2025

Russian Hackers Imitate European Events in Coordinated Phishing Campaigns

Russian state-linked hackers are impersonating high-profile European security conferences to compromise cloud email and collaboration accounts at governments, think tanks,…

PromptPwnd Vulnerability Exposes AI driven build systems to Data Theft
05
Dec
2025

PromptPwnd Vulnerability Exposes AI driven build systems to Data Theft – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Researchers at the software security company Aikido Security have reported a new type of vulnerability that could compromise how major…

An Anti-Sales Guide for MSPs
05
Dec
2025

An Anti-Sales Guide for MSPs

Most MSPs and MSSPs know how to deliver effective security. The challenge is helping prospects understand why it matters in…

Inotiv
05
Dec
2025

Pharma firm Inotiv discloses data breach after ransomware attack

American pharmaceutical firm Inotiv is notifying thousands of people that they’re personal information was stolen in an August 2025 ransomware attack….

Russian Calisto Hackers Target NATO Research Sectors with ClickFix Malicious Code
05
Dec
2025

Russian Calisto Hackers Target NATO Research Sectors with ClickFix Malicious Code

Russian-backed threat actors continue their sophisticated cyber espionage operations against Western institutions through advanced phishing tactics. Calisto, a Russia-nexus intrusion…