Author: Cybernoz

Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks
27
May
2025

Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks

A groundbreaking study from Tsinghua University and Zhongguancun Laboratory has uncovered critical vulnerabilities in modern web infrastructure, revealing that HTTP/2…

Weaponized Word Documents
27
May
2025

Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

May 27, 2025Ravie LakshmananMalware / Threat Intelligence The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing…

Crooks stole +$200 million from crypto exchange Cetus Protocol
27
May
2025

Crooks stole +$200 million from crypto exchange Cetus Protocol

Crooks stole over $200 million from crypto exchange Cetus Protocol Pierluigi Paganini May 27, 2025 Cetus Protocol reported a $223…

How Google Meet Pages Are Exploited to Deliver PowerShell Malware
27
May
2025

How Google Meet Pages Are Exploited to Deliver PowerShell Malware

A new wave of cyberattacks exploits user trust in Google Meet by deploying meticulously crafted fake meeting pages that trick…

4.5% of breaches now extend to fourth parties
27
May
2025

4.5% of breaches now extend to fourth parties

Security teams can no longer afford to treat third-party security as a compliance checkbox, according to SecurityScorecard. Traditional vendor risk…

How AI agents reshape industrial automation and risk management
27
May
2025

How AI agents reshape industrial automation and risk management

In this Help Net Security interview, Michael Metzler, Vice President Horizontal Management Cybersecurity for Digital Industries at Siemens, discusses the…

How well do you know your remote IT worker?
27
May
2025

How well do you know your remote IT worker?

Is the remote IT worker you recently hired really who he says he is? Fake IT workers are slipping into…

Cybersecurity jobs available right now: May 27, 2025
27
May
2025

Cybersecurity jobs available right now: May 27, 2025

Application Security Engineer, SDO AppSec Amazon | EMEA | Hybrid – View job details As an Application Security Engineer, SDO…

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data
27
May
2025

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data

Cybersecurity experts have noted an increase in data breaches where threat actors are directly querying internal databases to steal sensitive…

Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials
27
May
2025

Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials

Katz Stealer has emerged as a potent credential-stealing malware-as-a-service, targeting popular web browsers such as Chrome, Edge, Brave, and Firefox….

Services Australia refines public data to guide external AI use
27
May
2025

Services Australia refines public data to guide external AI use

Services Australia is wary of how external AI tools are consuming and referencing its information, with targeted adjustments being made…

Fake DigiYatra Apps Target Indian Users to Steal Financial Data
27
May
2025

Fake DigiYatra Apps Target Indian Users to Steal Financial Data

Threat actors have been exploiting the trust in India’s digital public infrastructure by setting up a deceptive phishing site, digiyatra[.]in,…