Author: Cybernoz

Philippines reports foreign cyber intrusion attempts targeting intelligence data
18
Feb
2025

Philippines reports foreign cyber intrusion attempts targeting intelligence data – Security

The Philippines has detected foreign attempts to access intelligence data, but its cyber minister said no breaches have been recorded…

A Novel Backdoor Attack Exploiting Customized LLMs' Reasoning Capabilities
18
Feb
2025

A Novel Backdoor Attack Exploiting Customized LLMs’ Reasoning Capabilities

The rise of customized large language models (LLMs) has revolutionized artificial intelligence applications, enabling businesses and individuals to leverage advanced…

Lion centralises IT, HR, finance and risk self-service for staff
18
Feb
2025

Lion centralises IT, HR, finance and risk self-service for staff – Digital Nation – Finance – Governance – HR

Drinks maker Lion has set up a self-service portal and mobile app for its staff to interact with its people…

Windows
18
Feb
2025

Microsoft reminds admins to prepare for WSUS driver sync deprecation

Microsoft once again reminded IT administrators that driver synchronization in Windows Server Update Services (WSUS) will be deprecated on April…

Cybercriminals Embedded Credit Card Stealer Script Within Tag
18
Feb
2025

Cybercriminals Embedded Credit Card Stealer Script Within Tag

Cybersecurity researchers have uncovered a new MageCart malware campaign targeting e-commerce websites running on the Magento platform. This attack exploits…

Juniper
18
Feb
2025

Juniper patches critical auth bypass in Session Smart routers

​Juniper Networks has patched a critical vulnerability that allows attackers to bypass authentication and take over Session Smart Router (SSR)…

How Phished Data Turns into Apple & Google Wallets – Krebs on Security
18
Feb
2025

How Phished Data Turns into Apple & Google Wallets – Krebs on Security

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion…

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation
18
Feb
2025

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT, raising concerns over their susceptibility to…

Hackerone logo
18
Feb
2025

Celebrating 10 Years of Partnership: Snap and HackerOne Reach $1M in Bounties

Q: Tell us about your role at Snap and why cybersecurity is vital to your business. Jim Higgins: I’m Snap’s…

Panda
18
Feb
2025

Chinese hackers abuse Microsoft APP-v tool to evade antivirus

The Chinese APT hacking group “Mustang Panda” has been spotted abusing the Microsoft Application Virtualization Injector utility as a LOLBIN to…

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats
18
Feb
2025

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

A recent study by researchers from the National University of Singapore and NCS Cyber Special Ops R&D explores how the…

Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks
18
Feb
2025

Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks

Two critical OpenSSH vulnerabilities discovered! Qualys TRU finds client and server flaws (CVE-2025-26465 & CVE-2025-26466) enabling MITM and DoS. Upgrade…