Author: Cybernoz

Alan Martin
10
Apr
2025

FBI investigating apparent ISIS attacks on Western websites

A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator….

Firebase Studio
10
Apr
2025

Google takes on Cursor with Firebase Studio, its AI builder for vibe coding

Google has quietly launched Firebase Studio, which is a cloud-based AI-powered integrated development environment that lets you build full-fledged apps…

Windows Kerberos Vulnerability Let Attackers Bypass Security Feature
10
Apr
2025

Windows Kerberos Vulnerability Let Attackers Bypass Security Feature

Microsoft has released a patch for a critical Windows Kerberos vulnerability (CVE-2025-29809) that allows attackers to bypass security features and…

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens
10
Apr
2025

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens

The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as Scattered Spider. Active since at…

U.S. Treasury email breach
10
Apr
2025

‘Highly Sensitive’ Data At Risk In U.S. Treasury Email Breach

The U.S. Treasury Department’s Office of the Comptroller of the Currency (OCC) has notified Congress of “a major information security…

My Respect for Christopher Hitchens Just Went Up Quite a Bit
10
Apr
2025

My Respect for Christopher Hitchens Just Went Up Quite a Bit

One of my favorite writers is Christopher Hitchens. I came to know him through his latest book on religion, titled…

Marc-Etienne M.Léveillé
09
Apr
2025

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware. Marc-Etienne M.Léveillé 09 Mar 2015  • …

Attackers Exploits SourceForge Software Hosting Platform to Deliver Malware
09
Apr
2025

Attackers Exploits SourceForge Software Hosting Platform to Deliver Malware

Cybercriminals have devised a sophisticated scheme exploiting SourceForge, a popular software hosting platform, to distribute malicious software disguised as legitimate…

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms
09
Apr
2025

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic, costing businesses millions. This type…

Some Clarification on How I View Most Believers
09
Apr
2025

Some Clarification on How I View Most Believers

I need to address something that’s come up in the last couple of months regarding my treatment of religion here…

Hacking or coding - Should you learn code before hacking? Labs Detectify
09
Apr
2025

Hacking or coding – Should you learn code before hacking? Labs Detectify

You will find a common pattern if you read blog posts or watch interviews with some of today’s top ethical…

David Harley
09
Apr
2025

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity. 10…