Author: Cybernoz
As digital transformation accelerates across industries, the cybersecurity landscape is changing. 2025 marks a pivotal moment, with organizations worldwide facing…
A newly disclosed critical vulnerability (CVE-2025-4009) in Evertz’s Software Defined Video Network (SDVN) product line exposes a wide range of…
May 28, 2025Ravie LakshmananData Privacy / Vulnerability Cybersecurity researchers have discovered a security flaw in Microsoft’s OneDrive File Picker that,…
New PumaBot targets Linux IoT surveillance devices Pierluigi Paganini May 28, 2025 PumaBot targets Linux IoT devices, using SSH brute-force…
The Czech Republic says the Chinese-backed APT31 hacking group was behind cyberattacks targeting the country’s Ministry of Foreign Affairs and…
A highly coordinated reconnaissance campaign that deployed 251 malicious IP addresses in a single-day operation targeting cloud-based infrastructure. The attack,…
Zscaler, Inc. (NASDAQ: ZS), the global leader in cloud security, has announced a definitive agreement to acquire Red Canary, a…
Over a year ago the FBI warned about what was then a new form of smishing (phishing via SMS) scam:…
May 28, 2025The Hacker NewsIdentity Theft / Enterprise Security Stealer malware no longer just steals passwords. In 2025, it steals…
Over the past year, a threat actor has been banking on the wild popularity of AI tools to lure computer…
App Store Security: Apple stops $2B in fraud in 2024 alone, $9B over 5 years Pierluigi Paganini May 28, 2025…
Threat actors are now leveraging the often-overlooked Component Object Model (COM) and its distributed counterpart, Distributed Component Object Model (DCOM),…











