Author: Cybernoz

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors
16
Dec
2025

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor,…

The changing workplace: Shifts defining its future
16
Dec
2025

The changing workplace: Shifts defining its future

Workplace technology is entering a new phase. The findings from CCS Insight’s Survey: Employee Workplace Technology, 2025 reveal a landscape…

Jaguar Land Rover Confirms August Cyberattack Led to Employee Data Theft
16
Dec
2025

Jaguar Land Rover Confirms August Cyberattack Led to Employee Data Theft

Jaguar Land Rover (JLR) has officially confirmed that a major cyberattack in August resulted in the theft of sensitive personal…

Is AI more than hot air?
16
Dec
2025

Is AI more than hot air?

Thank you for joining! Access your Pro+ Content below. 16 December 2025 Is AI more than hot air? Share this…

report-ad-banner
16
Dec
2025

SoundCloud Cyberattack Triggers Data Exposure, Outages

SoundCloud has confirmed a cyberattack on its platform after days of user complaints about service disruptions and connectivity problems. In…

Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild
16
Dec
2025

Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild

An active intrusion is targeting critical authentication bypass vulnerabilities in Fortinet’s FortiGate appliances and related products. Threat actors are exploiting…

JumpCloud Remote Assist Windows Agent Vulnerability Allows Privilege Escalation
16
Dec
2025

JumpCloud Remote Assist Windows Agent Vulnerability Allows Privilege Escalation

A critical local privilege escalation vulnerability in the JumpCloud Remote Assist for Windows agent allows any low-privileged user on a Windows system…

AI might be the answer for better phishing resilience
16
Dec
2025

AI might be the answer for better phishing resilience

Phishing is still a go-to tactic for attackers, which is why even small gains in user training are worth noticing….

China is Private Equity for the World
16
Dec
2025

China is Private Equity for the World

I feel like China is becoming Private Equity for countries and continents. Basically, watch the world decay and sweep in…

SantaStealer Malware Steals Sensitive Files, Credentials, and Crypto Wallet Data
16
Dec
2025

SantaStealer Malware Steals Sensitive Files, Credentials, and Crypto Wallet Data

Cybersecurity researchers at Rapid7 Labs have uncovered a sophisticated new threat: SantaStealer, a malware-as-a-service information stealer actively promoted on Telegram…

The messy data trails of telehealth are becoming a security nightmare
16
Dec
2025

The messy data trails of telehealth are becoming a security nightmare

In this Help Net Security interview, Scott Bachand, CIO/CISO at Ro, discusses how telehealth reshapes the flow of patient data…

Google to Shut Down Dark Web Monitoring Tool in February 2026
16
Dec
2025

Google to Shut Down Dark Web Monitoring Tool in February 2026

Dec 16, 2025Ravie LakshmananDark Web / Online Safety Google has announced that it’s discontinuing its dark web report tool in…