Author: Cybernoz

TeamFiltration Pentesting Tool Weaponized to Hijack Microsoft Teams, Outlook, and Other Accounts
26
Jun
2025

TeamFiltration Pentesting Tool Weaponized to Hijack Microsoft Teams, Outlook, and Other Accounts

A sophisticated cyberattack campaign has weaponized a legitimate penetration testing framework to compromise thousands of Microsoft cloud accounts across hundreds…

IBM i Vulnerability Allows Attackers to Escalate Privileges
26
Jun
2025

IBM i Vulnerability Allows Attackers to Escalate Privileges

A critical security vulnerability has been identified in IBM i, potentially allowing attackers to escalate privileges and execute arbitrary code…

Protecting Business Data From Unauthorized Encryption Threats
26
Jun
2025

Protecting Business Data From Unauthorized Encryption Threats

Your business operates in an online environment where unauthorized encryption of data isn’t just possible, it’s probable. The financial impact…

26
Jun
2025

Bitdefender GravityZone EASM reduces threat exposure

Bitdefender announced Bitdefender GravityZone External Attack Surface Management (EASM), a new solution that gives businesses, managed service providers (MSPs) and…

CISA Adds 3 Flaws to KEV Catalog
26
Jun
2025

CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet

Jun 26, 2025Ravie LakshmananVulnerability / Firmware Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security…

The Rise of AI-Driven API Vulnerabilities
26
Jun
2025

The Rise of AI-Driven API Vulnerabilities

AI has had dramatic impacts on almost every facet of every industry. API security is no exception. Up until recently,…

CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks
26
Jun
2025

CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks

CISA has issued a critical warning regarding a Fortinet FortiOS vulnerability that poses significant risks to network security infrastructure.  On…

CISA Issues Alert on ControlID iDSecure Flaws Enabling Bypass Authentication
26
Jun
2025

CISA Issues Alert on ControlID iDSecure Flaws Enabling Bypass Authentication

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding critical vulnerabilities in ControlID’s iDSecure On-premises software,…

26
Jun
2025

Google’s Gemini CLI brings open-source AI agents to developers

Google has open-sourced a command-line interface (CLI) agent built on its Gemini 1.5 Pro model, marking a notable step toward…

Multiple Brother Devices Vulnerabilities Open Devices for Hacking
26
Jun
2025

Multiple Brother Devices Vulnerabilities Open Devices for Hacking

A comprehensive security research investigation has unveiled eight critical vulnerabilities affecting 742 printer and multifunction device models across four major…

MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs
26
Jun
2025

MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs

A dramatic surge in scanning and exploitation activity targeting Progress Software’s MOVEit Transfer file-sharing platform has alarmed cybersecurity researchers and…

26
Jun
2025

Building cyber resilience in always-on industrial environments

In this Help Net Security interview, Dr. Tim Sattler, CISO at Jungheinrich, discusses the cybersecurity risks tied to smart warehouses…