Author: Cybernoz

Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack
12
Jun
2025

Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack

A newly disclosed vulnerability, CVE-2025-33073, dubbed the “Reflective Kerberos Relay Attack,” has shaken the Windows security landscape. Discovered by RedTeam…

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
12
Jun
2025

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Jun 12, 2025Ravie LakshmananVulnerability / Software Security ConnectWise has disclosed that it’s planning to rotate the digital code signing certificates…

Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums
12
Jun
2025

Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums

A sophisticated new threat platform, Nytheon AI, has emerged, which combines multiple uncensored large language models (LLMs) built specifically for…

0-Click Vulnerability in Microsoft 365 Copilot Exposes Sensitive Data via Teams
12
Jun
2025

0-Click Vulnerability in Microsoft 365 Copilot Exposes Sensitive Data via Teams

Security researchers have uncovered the first-ever zero-click vulnerability in an AI agent, targeting Microsoft 365 Copilot and potentially exposing sensitive…

12
Jun
2025

Lemony mitigates privacy and compliance risks associated with cloud-based AI

Lemony announced its on-premise artificial intelligence solution that is redefining how organizations deploy generative AI. Lemony’s secure, hardware-based node offers…

40,000 security cameras vulnerable to remote hacking
12
Jun
2025

40,000 security cameras vulnerable to remote hacking

Exposed eyes: 40,000 security cameras vulnerable to remote hacking Pierluigi Paganini June 12, 2025 Over 40,000 internet-exposed security cameras worldwide…

Nytheon AI Tool Gaining Traction on Hacking Forums for Malicious Activities
12
Jun
2025

Nytheon AI Tool Gaining Traction on Hacking Forums for Malicious Activities

The emergence of Nytheon AI marks a significant escalation in the landscape of uncensored large language model (LLM) platforms. Unlike…

12
Jun
2025

Build a mobile hacking rig with a Pixel and Kali NetHunter

A cybersecurity hobbyist has built a compact, foldable mobile hacking rig that runs Kali NetHunter on a Google Pixel 3…

Rick Bohm on AI, Collaboration & API Security Future
12
Jun
2025

Rick Bohm on AI, Collaboration & API Security Future

Nestled in a log cabin high in the Rocky Mountains, Rick Bohm starts his day the same way he’s approached…

12
Jun
2025

Cybercriminals are turning stolen data into a thriving black market

Cybercriminals are stealing data and running full-scale businesses around it. Europol’s latest Internet Organised Crime Threat Assessment (IOCTA) report reveals…

CISA Issues Comprehensive Guide to Safeguard Network Edge Devices from Cyber Threats
12
Jun
2025

CISA Issues Comprehensive Guide to Safeguard Network Edge Devices from Cyber Threats

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with international cybersecurity authorities, announced the release of comprehensive guidance to…

12
Jun
2025

Want fewer security fires to fight? Start with threat modeling

CISOs understand that threat modeling helps teams identify risks early and build safer systems. But outside the security org, the…