Author: Cybernoz

Prioritizing Vulnerabilities in a Sea of Alerts
03
Jun
2025

Prioritizing Vulnerabilities in a Sea of Alerts

According to recent industry analysis, cybersecurity professionals are overwhelmed by a flood of security alerts. Organizations process an average of…

US cyber agency CISA faces stiff budget cuts
03
Jun
2025

US cyber agency CISA faces stiff budget cuts

The United States’ Cybersecurity and Infrastructure Security Agency (CISA), is likely to have its funding cut by approximately $495m and…

Orica to set new workforce systems live in Australia in July
03
Jun
2025

Orica to set new workforce systems live in Australia in July

Orica will go live with a new payroll and workforce management system in Australia in July, the “biggest and most…

MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction
02
Jun
2025

MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction

Multiple critical security vulnerabilities affecting MediaTek smartphones, tablets, and IoT chipsets could allow attackers to escalate privileges and compromise device…

The hidden security risks of open source AI
02
Jun
2025

The hidden security risks of open source AI

Open source AI is gaining momentum across major players. DeepSeek recently announced plans to share parts of its model architecture…

Telstra launches satellite messaging service
02
Jun
2025

Telstra launches satellite messaging service

Telstra has commercially launched Starlink-backed satellite-to-mobile messaging just weeks after live trials, albeit initially only for Samsung Galaxy S25 series…

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection
02
Jun
2025

Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection

Significant vulnerabilities were uncovered in pre-installed applications on Ulefone and Krüger&Matz Android smartphones that expose users to significant risks, including…

Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware
02
Jun
2025

Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware

Cybersecurity researchers have identified a sophisticated malware campaign utilizing deceptive CAPTCHA interfaces to distribute EddieStealer, a Rust-based information stealing malware…

How to Keep Your Litecoin Safe: A Practical Guide
02
Jun
2025

How to Keep Your Litecoin Safe: A Practical Guide

Litecoin (LTC), often called the “silver to Bitcoin’s gold,” has long been popular for its speed, lower transaction fees, and…

DSPM vs. DLP : Understanding the Key Differences
02
Jun
2025

DSPM vs. DLP : Understanding the Key Differences

Modern organizations face a growing challenge in protecting sensitive data. As more people adopt the cloud and rules get tougher,…

Stealth Syscall Technique Allows Hackers to Evade Event Tracing and EDR Detection
02
Jun
2025

Stealth Syscall Technique Allows Hackers to Evade Event Tracing and EDR Detection

Advanced threat actors have developed sophisticated stealth syscall execution techniques that successfully bypass modern security infrastructure, including Event Tracing for…

Linux Crash Reporting Flaws (CVE-2025-5054, 4598) Expose Password Hashes
02
Jun
2025

Linux Crash Reporting Flaws (CVE-2025-5054, 4598) Expose Password Hashes

Qualys details CVE-2025-5054 and CVE-2025-4598, critical vulnerabilities affecting Linux crash reporting tools like Apport and systemd-coredump. Learn how to protect…