Author: Cybernoz

DragonForce Ransomware Targets Critical Businesses to Exfiltrate Sensitive Data
05
Feb
2026

DragonForce Ransomware Targets Critical Businesses to Exfiltrate Sensitive Data

DragonForce is a ransomware group that emerged in late 2023 and has grown into a serious threat to businesses by…

05
Feb
2026

Microsoft brings project-focused AI agents into OneDrive

Teams often rely on shared document collections to track project history, decisions, and operational knowledge. To support this workflow, Microsoft…

05
Feb
2026

Critical N8n Vulnerability CVE-2026-25049 Enables RCE

A newly disclosed critical vulnerability,  tracked as CVE-2026-25049, in the workflow automation platform n8n, allows authenticated users to execute arbitrary…

global bug bounty adoption accelerates, led by the U.S.
05
Feb
2026

global bug bounty adoption accelerates, led by the U.S.

Bug bounty programs have evolved from a niche security tactic into a core component of modern defense strategies worldwide. In this blog, we focus…

Beware of Fake Traffic Ticket Portals that Harvest Your PII and Credit Card Data
05
Feb
2026

Beware of Fake Traffic Ticket Portals that Harvest Your PII and Credit Card Data

A sophisticated phishing campaign targeting Canadian citizens has emerged, using fake traffic ticket payment portals to steal personal and financial…

Cyberattackers Exploit DNS TXT Records in ClickFix Script to Execute Malicious PowerShell Commands
05
Feb
2026

Cyberattackers Exploit DNS TXT Records in ClickFix Script to Execute Malicious PowerShell Commands

A new evolution in the “ClickFix” social engineering campaigns, dubbed KongTuke. This latest variant, observed actively since late December 2025, distinguishes…

05
Feb
2026

Microsoft launches LiteBox, a security-focused open-source library OS

Microsoft has released LiteBox, a project intended to function as a security-focused library OS that can serve as a secure…

05
Feb
2026

FDA Cybersecurity Guidance Updated To Align With QMSR

The US Food and Drug Administration (FDA) has reissued its final guidance on medical device cybersecurity to reflect the agency’s…

Hackers Exploit SonicWall SSLVPN Credentials to Deploy EDR Killer and Bypass Security
05
Feb
2026

Hackers Exploit SonicWall SSLVPN Credentials to Deploy EDR Killer and Bypass Security

EDR Killer Via SonicWall SSLVPN Threat actors are actively leveraging compromised SonicWall SSLVPN credentials to breach networks and deploy a…

New DesckVB RAT Unveiled with Multi-Stage Infection Chain and Plugin-Based Architecture
05
Feb
2026

New DesckVB RAT Unveiled with Multi-Stage Infection Chain and Plugin-Based Architecture

A sophisticated strain of the DeskVB Remote Access Trojan (RAT) has been identified in the wild, showcasing a highly modular…

05
Feb
2026

Varonis acquires AllTrue.ai to enable safe, compliant AI at scale

Varonis has acquired AllTrue.ai to help organizations adopt safe, compliant and trustworthy AI at scale. AllTrue.ai brings real-time visibility and…

DragonForce Ransomware Attacking Critical Business to Exfiltrate Sensitive Information
05
Feb
2026

DragonForce Ransomware Attacking Critical Business to Exfiltrate Sensitive Information

A new ransomware operation known as DragonForce has emerged as a major threat to organizations worldwide since its appearance in…