Author: Cybernoz

It's a wrap! RSAC 2025 highlights – Week in security with Tony Anscombe
04
May
2025

It’s a wrap! RSAC 2025 highlights – Week in security with Tony Anscombe

From the power of collaborative defense to identity security and AI, catch up on the event’s key themes and discussions…

Microsoft
04
May
2025

Microsoft ends Authenticator password autofill, moves users to Edge

Microsoft has announced that it will discontinue the password storage and autofill feature in the Authenticator app starting in July and…

watchTowr Warns of Active Exploitation of SonicWall SMA 100 Devices
04
May
2025

watchTowr Warns of Active Exploitation of SonicWall SMA 100 Devices

watchTowr reveals active exploitation of SonicWall SMA 100 vulnerabilities (CVE-2024-38475 & CVE-2023-44221) potentially leading to full system takeover and session…

Google NotebookLM
04
May
2025

Google NotebookLM is now using Gemini 2.5 Flash

Google NotebookLM, which is a research and note-taking AI tool, is getting upgraded to Gemini 2.5 Flash. NotebookLM has been…

Billions of Apple Devices at Risk from “AirBorne” AirPlay Vulnerabilities
03
May
2025

Billions of Apple Devices at Risk from “AirBorne” AirPlay Vulnerabilities

Oligo Security uncovers “AirBorne,” a set of 23 vulnerabilities in Apple AirPlay affecting billions of devices. Learn how these flaws…

Rhysida Ransomware gang claims the hack of the Government of Peru
03
May
2025

Rhysida Ransomware gang claims the hack of the Government of Peru

Rhysida Ransomware gang claims the hack of the Government of Peru Pierluigi Paganini May 03, 2025 The Rhysida Ransomware gang…

DragonForce group claims the theft of data after Co-op cyberattack
03
May
2025

DragonForce group claims the theft of data after Co-op cyberattack

DragonForce group claims the theft of data after Co-op cyberattack Pierluigi Paganini May 03, 2025 Hackers claim Co-op cyberattack is…

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack
03
May
2025

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

May 03, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code…

Scam Emails Impersonating Qantas Airways Target Credit Card Details
03
May
2025

Phishing Emails Impersonating Qantas Target Credit Card Info

Fake Qantas emails in a sophisticated phishing scam steal credit card and personal info from Australians, bypassing major email security…

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware
03
May
2025

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

May 03, 2025Ravie LakshmananMalware / Operational Technology An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion…

U.S. CISA adds Yii Framework and Commvault Command Center flaws to its Known Exploited Vulnerabilities catalog
03
May
2025

U.S. CISA adds Yii Framework and Commvault Command Center flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Yii Framework and Commvault Command Center flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini May 03,…

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems
03
May
2025

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black…