Author: Cybernoz

Jane Devry
04
Feb
2025

Insider Threat Program Modernization: Trends, Technologies, and Whole-Person Risk Assessment

Insider threat management remains a top priority for organizations as insider incidents rise. Insider threats encompass a broad spectrum of…

Quantum datacentre deployments: How they are supporting evolving compute projects
04
Feb
2025

Quantum datacentre deployments: How they are supporting evolving compute projects

Put lots of qubits together and you have quantum computing, requiring datacentres that can support it. A quantum datacentre though…

7-Zip
04
Feb
2025

7-Zip MotW bypass exploited in zero-day attacks against Ukraine

A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by Russian…

New Tiny FUD Attacking macOS Users Bypassing Antivirus and Security Tools
04
Feb
2025

New Tiny FUD Attacking macOS Users Bypassing Antivirus and Security Tools

A new, highly sophisticated malware known as Tiny FUD has been identified, targeting macOS users with advanced evasion techniques that…

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access
04
Feb
2025

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a total of 47 vulnerabilities affecting Android…

New ValleyRAT Malware Variant Spreading via Fake Chrome Downloads
04
Feb
2025

New ValleyRAT Malware Variant Spreading via Fake Chrome Downloads

Morphisec uncovers a new ValleyRAT malware variant with advanced evasion tactics, multi-stage infection chains, and novel delivery methods targeting systems….

Behind a semi-opaque screen, one person's hand passes cash secretly to another person's hand
04
Feb
2025

New AI “agents” could hold people for ransom in 2025

A paradigm shift in technology is hurtling towards us, and it could change everything we know about cybersecurity. Uhh, again,…

All change: Weighing up the options for enterprises as open source licences evolve
04
Feb
2025

All change: Weighing up the options for enterprises as open source licences evolve

Potentially heralding a fundamental shift in definitions of open source, HashiCorp moved to more restrictive licensing for infrastructure-as-code (IaaS) tool…

Router
04
Feb
2025

Netgear warns users to patch critical WiFi router vulnerabilities

Netgear has fixed two critical vulnerabilities affecting multiple WiFi router models and urged customers to update their devices to the…

Apple Service Ticket portal Vulnerability Exposes Millions of Users Data
04
Feb
2025

Apple Service Ticket portal Vulnerability Exposes Millions of Users Data

A critical security flaw in Apple’s service ticket portal has come to light, potentially exposing the sensitive data of millions…

1- Click RCE Vulnerability In Voyager PHP Allow Attackers Execute Arbitrary code in Server
04
Feb
2025

1- Click RCE Vulnerability In Voyager PHP Allow Attackers Execute Arbitrary code in Server

A recently disclosed security vulnerability in the Voyager PHP package, a popular tool for managing Laravel applications, has raised significant…

Naveen Goud
04
Feb
2025

Taiwan bans DeepSeek AI and Meta warns its insider threats

Taiwan bans DeepSeek Chatbot of China Taiwan has officially imposed a ban on the use of DeepSeek, an AI-powered chatbot…