Author: Cybernoz

Passwordless authentication: Where security meets productivity
12
May
2025

Passwordless authentication: Where security meets productivity

According to Verizon’s 2024 Data Breach Investigations Report, 80% of breaches stem from compromised credentials. While passwords were meant to…

Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data
12
May
2025

Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data

Multiple vulnerabilities in Microsoft’s Copilot AI for SharePoint, enabling attackers to access sensitive corporate data including passwords, API keys, and…

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities
12
May
2025

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative approach that leverages Mach Interprocess…

Fake AI Tools Used to Spread Malware
12
May
2025

Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures

May 12, 2025Ravie LakshmananMalware / Artificial Intelligence Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a…

CVE-2024-26809
12
May
2025

CVE-2024-26809: Linux Nftables Double-Free Vulnerability

A critical security flaw has been discovered in the Linux kernel’s nftables subsystem, which is responsible for packet filtering in…

PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability
12
May
2025

PoC Exploit Released For Linux Kernel’s nftables Subsystem Vulnerability

A critical Proof-of-Concept (PoC) exploit has been released for a significant vulnerability in the Linux kernel’s nftables subsystem, tracked as…

Cybercriminals Hide Undetectable Ransomware Inside JPG Images
12
May
2025

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files to deliver fully undetectable (FUD) ransomware,…

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis
12
May
2025

New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis

Cybersecurity experts have identified a sophisticated phishing technique that exploits blob URIs (Uniform Resource Identifiers) to evade detection by Secure…

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps
12
May
2025

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps

Microsoft has announced the upcoming release of a groundbreaking “Prevent Screen Capture” feature for Teams, designed to block unauthorized screenshots…

Bluetooth 6.1 released, enhances privacy and power efficiency
12
May
2025

Bluetooth 6.1 released, enhances privacy and power efficiency

The Bluetooth Special Interest Group has released Bluetooth 6.1, and one of the most important new features is an update…

data privacy
12
May
2025

Texas AG Paxton Wins $1.375B Google Deal On Data Privacy

Texas Attorney General Ken Paxton has reached a $1.375 billion settlement with tech giant Google, marking the largest amount ever…

German police seized eXch crypto exchange
12
May
2025

German police seized eXch crypto exchange

German police seized eXch crypto exchange Pierluigi Paganini May 12, 2025 Germany’s BKA shut down eXch crypto exchange, seizing its…