Author: Cybernoz

Critical React, Next.js flaw lets hackers execute code on servers
04
Dec
2025

Critical React, Next.js flaw lets hackers execute code on servers

A maximum severity vulnerability, dubbed ‘React2Shell’, in the React Server Components (RSC) ‘Flight’ protocol allows remote code execution without authentication in React and…

New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT
04
Dec
2025

New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT

A comprehensive phishing operation began targeting Indian companies in November 2025 by impersonating the Income Tax Department of India. The…

Akamai Fixes HTTP Request Smuggling Flaw in Edge Servers
04
Dec
2025

Akamai Fixes HTTP Request Smuggling Flaw in Edge Servers

Akamai has fixed a vulnerability in its edge servers that could have allowed HTTP Request Smuggling attacks. The issue was…

Cybersecurity in Agentic Commerce: Safeguarding the Autonomous Future
04
Dec
2025

Cybersecurity in Agentic Commerce: Safeguarding the Autonomous Future

04 Dec Cybersecurity in Agentic Commerce: Safeguarding the Autonomous Future Posted at 09:43h in Blogs by Taylor Fox Building a…

Malicious Rust packages targeted Web3 developers
04
Dec
2025

Malicious Rust packages targeted Web3 developers

A malicious Rust crate (package) named evm-units, aimed at stealing cryptocurrency from unsuspecting developers, has been pulled from the official…

facial recognition
04
Dec
2025

Canadian police trialing facial recognition bodycams

A municipal police force in Canada is now using facial recognition bodycams, it was revealed this week. The police service…

Home Office launches police facial recognition consultation
04
Dec
2025

Home Office launches police facial recognition consultation

The Home Office has formally opened a consultation on the use of facial recognition by UK police, saying the government…

Five-page draft Trump administration cyber strategy targeted for January release
04
Dec
2025

Five-page draft Trump administration cyber strategy targeted for January release

The Trump administration is aiming to release its six-part national cybersecurity strategy in January, according to multiple sources familiar with…

Threat Actors Leveraging Foxit PDF Reader to Gain System Control and Steal Sensitive Data
04
Dec
2025

Threat Actors Leveraging Foxit PDF Reader to Gain System Control and Steal Sensitive Data

Cybercriminals have discovered a clever way to slip malware onto job seekers’ computers by disguising malicious files as legitimate recruitment…

Sryxen’ Malware Uses Headless Browser Trick to Bypass Chrome Protections
04
Dec
2025

Sryxen’ Malware Uses Headless Browser Trick to Bypass Chrome Protections

A new Windows-focused information stealer dubbed “Sryxen” is drawing attention in the security community for its blend of modern browser…

Software QA Teams Prevent Cyber Disasters By Finding Vulnerabilities Before Hackers Do
04
Dec
2025

How To Reframe Cybersecurity Budget Requests And Get Them Approved

04 Dec How To Reframe Cybersecurity Budget Requests And Get Them Approved Posted at 09:07h in Blogs by Taylor Fox…

Arizona Attorney General Suses Chinese E-commerce Retailer Temu Over Data Theft Claims
04
Dec
2025

Arizona Attorney General Suses Chinese E-commerce Retailer Temu Over Data Theft Claims

Arizona Attorney General Kris Mayes has announced a lawsuit against the popular Chinese e-commerce retailer Temu, accusing the company of…