Author: Cybernoz
They say you are a composite of your closest friends, and given my ambition I often grapple with a balance…
In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious npm packages that are nefariously exploiting…
Threat actors are exploiting bulletproof hosting service Proton66 for malicious activities, including campaigns from SuperBlack ransomware operators, Android malware distribution…
There are now several public proof-of-concept (PoC) exploits for a maximum-severity vulnerability in the Erlang/OTP SSH server (CVE-2025-32433) unveiled last…
In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed…
Having worked in IT for a good bit of time I have thought a lot about various information technology skillsets…
Researchers have uncovered a sophisticated new variant of the notorious Lumma InfoStealer malware, employing advanced code flow obfuscation techniques to…
Was your Microsoft Entra ID account locked? Find out about the recent widespread lockouts caused by the new MACE Credential…
As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints,…
Few terms are so misused as “racist”. People use it to describe everything from Jim Crow to fashion magazines with…
A new malware named “RustoBot” has been discovered exploiting vulnerabilities in various router models to gain unauthorized access and initiate…
Artificial intelligence is transforming industries, but its adoption also raises ethical and cybersecurity concerns, especially in the regulated financial sector….











