Author: Cybernoz

Pentagon's AI metals program goes private
05
May
2025

Pentagon’s AI metals program goes private

A US government-created artificial intelligence program that aims to predict the supply and price of critical minerals has been transferred…

Airservices consolidates tech under CISO leadership
05
May
2025

Airservices consolidates tech under CISO leadership

Airservices Australia has consolidated technology functions into a newly formed division led by chief information security officer Anthony Kitzelmann. The…

ACT Education breaks seven-year Lenovo spree in device refresh
04
May
2025

ACT Education breaks seven-year Lenovo spree in device refresh

The ACT has ended its seven-year run of supplying Lenovo Chromebooks to public schools, opting instead for devices from ASUS…

OpenAI
04
May
2025

OpenAI document explains when to use each ChatGPT model

OpenAI admitted that it can be confusing for users to choose between all the different models, but the company has…

Stealer
04
May
2025

StealC malware enhanced with stealth upgrades and data theft tools

The creators of StealC, a widely-used information stealer and malware downloader, have released its second major version, bringing multiple stealth…

Malicious Go Modules designed to wipe Linux systems
04
May
2025

Malicious Go Modules designed to wipe Linux systems

Malicious Go Modules designed to wipe Linux systems Pierluigi Paganini May 04, 2025 Researchers found 3 malicious Go modules with…

Claude AI Abused in Influence-as-a-Service Operations and Campaigns
04
May
2025

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range of adversarial operations, most notably a…

Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION
04
May
2025

Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 522 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini May 04, 2025 A new round of…

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference
04
May
2025

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RSAC 2025 ConferenceRSAC 2025 Conference…

Threat Actors Attacking U.S. citizens Via social engineering Attack
04
May
2025

Threat Actors Attacking U.S. citizens Via social engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting U.S. citizens, according to a detailed…

Browser Credential & Sensitive‑Data Heists on the Rise
04
May
2025

Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the notorious financially motivated threat actor Golden…

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape
04
May
2025

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape

Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid ongoing conflicts. In 2024, Forescout Technologies…