Author: Cybernoz

TeamViewer Windows App Let Attackers Escalate Privileges to System User
30
Jan
2025

TeamViewer Windows App Let Attackers Escalate Privileges to System User

A critical security vulnerability has been identified in TeamViewer Clients for Windows, allowing attackers with local access to escalate their…

Unpatched PHP Voyager Flaws
30
Jan
2025

Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits

Jan 30, 2025Ravie LakshmananWeb Security / Vulnerability Three security flaws have been disclosed in the open-source PHP package Voyager that…

Apple's Big AI Jump | Daniel Miessler
30
Jan
2025

Apple’s Big AI Jump | Daniel Miessler

How Apple will go from the worst AI to the best Apple’s about to go from having the worst AI…

Hackerone logo
30
Jan
2025

GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?

The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…

Google’s Subdomain 'g.co' Hacked – Hackers Gain Google Account Access Over Phone Call
30
Jan
2025

Google’s Subdomain ‘g.co’ Hacked – Hackers Gain Google Account Access Over Phone Call

Cybercriminals recently exploited Google’s g.co subdomain to carry out a meticulously crafted scam over a vishing call. The incident was…

Hackerone logo
30
Jan
2025

A Year In HackerOne’s Bug Bounty Program

Hackers Report The Most Vulnerabilities In 2022 To Keep The Platform Secure We looked at how our program performed from…

ExtensionHound: Open-source tool for Chrome extension DNS forensics
30
Jan
2025

ExtensionHound: Open-source tool for Chrome extension DNS forensics

Traditional monitoring tools reveal only traffic from the Chrome process, leaving security teams uncertain about which extension is responsible for…

Threat Actors Exploit Government Website Vulnerabilities For Phishing Attacks
30
Jan
2025

Threat Actors Exploit Government Website Vulnerabilities For Phishing Attacks

Cybercriminals are increasingly exploiting vulnerabilities in government websites to carry out phishing campaigns, leveraging the inherent trust users place in…

Naveen Goud
30
Jan
2025

DeepSeek AI data under scrutiny as Microsoft investigates OpenAI data steal

DeepSeek AI, a Chinese chatbot service that recently gained traction on the Apple App Store, is now in the spotlight…

Zscaler CISO on balancing security and user convenience in hybrid work environments
30
Jan
2025

Zscaler CISO on balancing security and user convenience in hybrid work environments

In this Help Net Security interview, Sean Cordero, CISO at Zscaler, talks about securing hybrid work and the new challenges…

Hackerone logo
30
Jan
2025

Improve DevOps Security With Code Security Audit

Use Code Security Audit for DevOps DevOps teams may care about security, but it is not their area of expertise…

89% of AI-powered APIs rely on insecure authentication mechanisms
30
Jan
2025

89% of AI-powered APIs rely on insecure authentication mechanisms

APIs have emerged as the predominant attack surface over the past year, with AI being the biggest driver of API…