Author: Cybernoz

Solana Pump.fun tool DogWifTool compromised to drain wallets
30
Jan
2025

Solana Pump.fun tool DogWifTool compromised to drain wallets

Hackers have compromised the Windows version of the DogWifTools software for promoting meme coins on the Solana blockchain in a…

Hackerone logo
30
Jan
2025

The Future of Generative AI and Security [2 Predictions]

Offensive AI Will Outpace Defensive AI In the short term, and possibly indefinitely, we will see offensive or malicious AI…

Hackerone logo
30
Jan
2025

Manage Your Attack Surface With Continuous Security Testing

Creating Continuous Attack Resistance  In order to stay ahead of cybercriminals, businesses need to preemptively find flaws in their digital…

Russian UAC-0063 Targets Europe and Central Asia with Advanced Malware
30
Jan
2025

Russian UAC-0063 Targets Europe and Central Asia with Advanced Malware

UAC-0063: A Russian-linked threat actor targeting Central Asia and Europe with sophisticated cyberespionage campaigns, including weaponized documents, data exfiltration, and…

APRA finds new cyber security leader
30
Jan
2025

APRA finds new cyber security leader – Security – Training & Development

The Australian Prudential Regulation Authority (APRA) has hired Bianca Wirth as its new chief information security officer following a four-month…

Aquabot variant v3 targets Mitel SIP phones
30
Jan
2025

Aquabot variant v3 targets Mitel SIP phones

Aquabot variant v3 targets Mitel SIP phones Pierluigi Paganini January 29, 2025 A new variant of the Mirai-based botnet Aquabot…

Apple Chips Vulnerability Exposes Credit Cards & Location History to Hackers
30
Jan
2025

Apple Chips Vulnerability Exposes Credit Cards & Location History to Hackers

Researchers have uncovered two critical vulnerabilities in Apple’s custom silicon chips, dubbed SLAP (Speculative Load Address Prediction) and FLOP (False…

Exposed DeepSeek Database Revealed Chat Prompts and Internal Data
30
Jan
2025

Exposed DeepSeek Database Revealed Chat Prompts and Internal Data

“It’s pretty shocking to build an AI model and leave the backdoor wide open from a security perspective,” says independent…

Microsoft probes if DeepSeek-linked group improperly obtained OpenAI data
30
Jan
2025

Microsoft probes if DeepSeek-linked group improperly obtained OpenAI data – Software – Security

Microsoft and OpenAI are probing if data output from the ChatGPT maker’s technology was obtained in an unauthorised manner by…

U.S. CISA adds Apple products' flaw to its Known Exploited Vulnerabilities catalog
30
Jan
2025

U.S. CISA adds Apple products’ flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Apple products’ flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 29, 2025 U.S. Cybersecurity and…

Hackerone logo
30
Jan
2025

Five Takeaways from Ohio Secretary of State’s VDP Success Story

Recently, Ohio Secretary of State Chief Information Security Officer Jillian Burner, and HackerOne Co-founder and Head of Professional Services, Michiel…

State-sponsored Actors Abusing Gemini to Fuel Cyber Attacks
30
Jan
2025

State-sponsored Actors Abusing Gemini to Fuel Cyber Attacks

The state-sponsored threat actors are increasingly exploiting Google’s AI-powered assistant, Gemini, to enhance their cyber operations.  While generative AI tools…