Author: Cybernoz
A targeted campaign exploited Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances to extract EC2 Metadata, which…
A critical vulnerability in the USB-audio driver, which could lead to out-of-bounds memory reads, has been addressed by a recent…
A hacker using the alias “Satanic” claims a WooCommerce data breach via a third party, selling data on over 4.4…
I feel a surge of energy right now — a sense of excitement. The feeling comes from realizing how little…
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator….
Google has quietly launched Firebase Studio, which is a cloud-based AI-powered integrated development environment that lets you build full-fledged apps…
Microsoft has released a patch for a critical Windows Kerberos vulnerability (CVE-2025-29809) that allows attackers to bypass security features and…
The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as Scattered Spider. Active since at…
The U.S. Treasury Department’s Office of the Comptroller of the Currency (OCC) has notified Congress of “a major information security…
One of my favorite writers is Christopher Hitchens. I came to know him through his latest book on religion, titled…
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware. Marc-Etienne M.Léveillé 09 Mar 2015 • …
Cybercriminals have devised a sophisticated scheme exploiting SourceForge, a popular software hosting platform, to distribute malicious software disguised as legitimate…









