Author: Cybernoz

Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing
19
Mar
2025

Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing

A critical vulnerability in Windows File Explorer, identified as CVE-2025-24071, enables attackers to steal NTLM hashed passwords without any user…

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability
19
Mar
2025

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used…

Apache Tomcat vulnerability
19
Mar
2025

CERT NZ Shares Advisory For Apache Tomcat Vulnerability

The New Zealand Computer Emergency Response Team (CERT NZ) has issued an urgent security advisory warning of a critical vulnerability,…

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware
19
Mar
2025

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware. This campaign leverages fake CAPTCHA prompts…

cybernewswire
19
Mar
2025

Knocknoc Raises Seed Funding to Scale Its Just-In-Time Network Access Control Technology

Sydney, Australia, March 19th, 2025, CyberNewsWire Sydney-based cybersecurity software company Knocknoc has raised a seed round from US-based venture capital…

CVE-2025-30066
19
Mar
2025

Patch Your GitHub Workflows ASAP

A security vulnerability (CVE-2025-30066) has been identified in a widely used third-party GitHub Action, tj-actions/changed files. This security flaw exposes…

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code
19
Mar
2025

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical vulnerability affecting Synology’s DiskStation Manager (DSM) has been disclosed, allowing remote attackers to execute arbitrary code on vulnerable…

Naveen Goud
19
Mar
2025

Browser search can land you into ransomware troubles

For years, ransomware attacks have targeted individuals, corporate networks, and government agencies. However, experts are now highlighting a new method…

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems
19
Mar
2025

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

Mar 19, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a…

U.S. CISA adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog
19
Mar
2025

U.S. CISA adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini March 19, 2025 U.S. Cybersecurity…

CISA Warns of Fortinet FortiOS Authentication Bypass Vulnerability
19
Mar
2025

CISA Warns of Fortinet FortiOS Authentication Bypass Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert highlighting a significant vulnerability in Fortinet’s FortiOS…

Naveen Goud
19
Mar
2025

Shifting to Decentralized Data Storage: The Key to Better Data Security and Privacy

In today’s digital world, data security and privacy are more critical than ever. With the increasing number of cyberattacks, data…