Author: Cybernoz

Announcing the inaugural Digital Nation Awards 2025
06
May
2025

Announcing the inaugural Digital Nation Awards 2025

Digital Nation is proudly hosting its first-ever Digital Nation Awards event, celebrating outstanding achievements in digital transformation, from groundbreaking tech…

google plus
06
May
2025

Google addresses 1 actively exploited vulnerability in May’s Android security update

Google addressed 47 vulnerabilities affecting Android devices in its May security update, including an actively exploited software defect that was…

Signal Clone Used by Mike Waltz Pauses Service After Reports It Got Hacked
06
May
2025

Signal Clone Used by Mike Waltz Pauses Service After Reports It Got Hacked

The messaging app used by at least one top Trump administration official has suspended its services following reports of hackers…

Chat App Used by Trump Admin Suspends Operation Amid Hack
06
May
2025

Chat App Used by Trump Admin Suspends Operation Amid Hack

TM SGNL, a chat app by US-Israeli firm TeleMessage used by Trump officials, halts operations after a breach exposed messages…

Qld government scales up generative AI usage
06
May
2025

Qld government scales up generative AI usage

Over 14,000 Queensland public service workers have adopted the state government’s generative AI tool, QChat, nearly a year after it…

Phishing
06
May
2025

Darcula PhaaS steals 884,000 credit cards via phishing texts

The Darcula phishing-as-a-service (PhaaS) platform stole 884,000 credit cards from 13 million clicks on malicious links sent via text messages…

Transport for NSW expands SAP Ariba usage
06
May
2025

Transport for NSW expands SAP Ariba usage

Transport for NSW is expanding its SAP Ariba service to improve supplier vetting in its procurement activities. The transport department…

DOD plans to fast-track software security reviews
05
May
2025

DOD plans to fast-track software security reviews

Dive Brief: The Department of Defense is streamlining its software-procurement approval process. The Pentagon on Monday announced that its “Software…

Hacker with arms raised
05
May
2025

New “Bring Your Own Installer” EDR bypass used in ransomware attack

A new “Bring Your Own Installer” EDR bypass technique is exploited in attacks to bypass SentinelOne’s tamper protection feature, allowing threat…

MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets
05
May
2025

MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Kubernetes
05
May
2025

Microsoft finds default Kubernetes Helm charts can expose data

Microsoft warns about the security risks posed by default configurations in Kubernetes deployments, particularly those using out-of-the-box Helm charts, which…

Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000
05
May
2025

Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000

A newly discovered dark web listing claims to sell a critical SS7 protocol exploit for $5,000, raising alarms about global…