Author: Cybernoz

159 CVEs
24
Apr
2025

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

Apr 24, 2025Ravie LakshmananVulnerability / Threat Intelligence As many as 159 CVE identifiers have been flagged as exploited in the…

Challenges persist as UK’s Cyber Security and Resilience Bill moves forward
24
Apr
2025

Challenges persist as UK’s Cyber Security and Resilience Bill moves forward

Since the government announced in the King’s speech last year that they would bring forward a Cyber Security and Resilience…

Crooks exploit the death of Pope Francis
24
Apr
2025

Crooks exploit the death of Pope Francis

Crooks exploit the death of Pope Francis Pierluigi Paganini April 24, 2025 Crooks exploit the death of Pope Francis, using…

Redefining AppSec Testing with Intelligent Scan Recommendations and Asset Classification
24
Apr
2025

Redefining AppSec Testing with Intelligent Scan Recommendations and Asset Classification

As 9 out of 10 valuable web apps are missing testing, we’re launching new capabilities to help teams know what…

Commvault RCE Vulnerability Exploited—PoC Released
24
Apr
2025

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the disclosure of a major pre-authenticated remote…

AVX ONE PQC Tool delivers crypto inventory, risk insights, and readiness scoring
24
Apr
2025

AVX ONE PQC Tool delivers crypto inventory, risk insights, and readiness scoring

AppViewX has announced the launch of the AVX ONE Post-Quantum Cryptography (PQC) Assessment Tool that generates a Cryptographic Bill of…

Darcula Adds GenAI to Phishing Toolkit
24
Apr
2025

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

Apr 24, 2025Ravie LakshmananPhishing / Cybercrime The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to…

Podcast: RSA 2025 to grapple with AI compliance, US and EU regulation
24
Apr
2025

Podcast: RSA 2025 to grapple with AI compliance, US and EU regulation

In this podcast, we talk to Mathieu Gorge, CEO of Vigitrust, about the ongoing impact of artificial intelligence (AI) on…

DslogdRAT, JPCERT/CC, Malware, Ivanti Connect Secure VPN, Ivanti
24
Apr
2025

DslogdRAT Malware Deployed In Ivanti Connect Secure Attacks

A new wave of attacks targeting Ivanti Connect Secure VPN devices has revealed a stealthy malware strain known as DslogdRAT,…

DeepSeek
24
Apr
2025

DeepSeek Under Fire Over Data Privacy And AI Security Risks

Chinese artificial intelligence startup DeepSeek has come under intense scrutiny from South Korean authorities for allegedly transferring user data and…

Linux
24
Apr
2025

Linux ‘io_uring’ security blindspot allows stealthy rootkit attacks

A significant security gap in Linux runtime security caused by the ‘io_uring’ interface allows rootkits to operate undetected on systems…

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication
24
Apr
2025

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka “rainpwn”) has revealed a set of critical vulnerabilities in Zyxel’s USG FLEX-H firewall series that…