Author: Cybernoz

CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog
05
Feb
2025

CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel vulnerability, CVE-2024-53104, to its Known Exploited Vulnerabilities…

Google Cloud revenue soars as Alphabet continues to ride AI wave
05
Feb
2025

Google Cloud revenue soars as Alphabet continues to ride AI wave

Alphabet CEO Sundar Pichai has committed to continue investing in its cloud arm, as the firm’s fourth-quarter results confirmed Google…

Cryptocurrency falling
05
Feb
2025

Crypto-stealing apps found in Apple App Store for the first time

Android and iOS apps on the Google Play Store and Apple App Store contain a malicious software development kit (SDK)…

Multiple security Vulnerabilities in IBM Cloud Pak Let Attackers Execute Remote Code
05
Feb
2025

Multiple security Vulnerabilities in IBM Cloud Pak Let Attackers Execute Remote Code

IBM has released critical security updates addressing multiple vulnerabilities in its Cloud Pak for Business Automation software.  These vulnerabilities, if…

The Collapse of USAID Is Fueling Human Trafficking and Slavery at Scammer Compounds
05
Feb
2025

The Collapse of USAID Is Fueling Human Trafficking and Slavery at Scammer Compounds

“Our partners say that for some survivors they are in touch with inside the scam centers, even if they can…

CISA
05
Feb
2025

CISA tags Microsoft .NET and Apache OFBiz bugs as exploited in attacks

The US Cybersecurity & Infrastructure Security Agency (CISA) has added four vulnerabilities to its Known Exploited Vulnerabilities catalog, urging federal agencies…

Chinese Hackers Attacking Linux Devices With New SSH Backdoor
05
Feb
2025

Chinese Hackers Attacking Linux Devices With New SSH Backdoor

A new report from FortiGuard Labs reveals that Chinese hackers are actively targeting Linux devices with a sophisticated SSH backdoor…

Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
05
Feb
2025

Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)

XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181,…

Crowd-source testing helps drive Webex accessibility
05
Feb
2025

Crowd-source testing helps drive Webex accessibility

Applause, which provides digital quality and crowd-sourced testing, has worked with Cisco to ensure ongoing accessibility assessments of Webex Suite and…

Amazon S3 Namesquatting image
05
Feb
2025

How attackers abuse S3 Bucket Namesquatting — And How to Stop Them

With the sheer amount of data and users leveraging AWS, it’s easy for misconfigurations to slip through the cracks. One…

Threat Actors Exploiting DeepSeek's Rise To Fuel Cyber Attacks
05
Feb
2025

Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks

The AI startup DeepSeek has gained significant attention in recent weeks for its advanced AI models, particularly the R1 reasoning…

Banking Malware Uses Live Numbers to Hijack OTPs, Targeting 50,000 Victims
05
Feb
2025

Banking Malware Uses Live Numbers to Hijack OTPs, Targeting 50,000 Victims

Mobile devices have become a prime target for financial fraud, as the availability of digital payments and interception of OTPs…