Author: Cybernoz
The cybersecurity landscape continues to evolve as threat actors deploy increasingly sophisticated tools to compromise Windows-based infrastructure. CastleRAT, a Remote…
A human rights lawyer from Pakistan’s Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the…
A critical command injection vulnerability in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code remotely,…
The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has confirmed that a command injection vulnerability affecting Array Networks AG Series secure…
BRICKSTORM backdoor exposed: CISA warns of advanced China-backed intrusions Pierluigi Paganini December 05, 2025 CISA details BRICKSTORM, a China-linked backdoor…
Multiple China-linked threat actors began exploiting the React2Shell vulnerability (CVE-2025-55182) affecting React and Next.js just hours after the max-severity issue…
Critical security updates have been released to fix two high-severity flaws in the Triton Inference Server that let attackers crash…
An AI image generator startup left more than 1 million images and videos created with its systems exposed and accessible…
The cycle of vulnerability disclosure and weaponization has shattered records once again. According to a new threat intel from Amazon…
A new sophisticated threat actor has emerged in the cybersecurity landscape, targeting critical infrastructure across the United States. The adversary,…
Attackers are actively exploiting a serious vulnerability in Array Networks’ ArrayOS AG series to gain unauthorized access to enterprise networks….
Intellexa staff members connected directly to at least 10 deployed Predator customer systems using TeamViewer commercial remote administration software, a…