Author: Cybernoz

Building a stronger SOC through AI augmentation
24
Sep
2025

Building a stronger SOC through AI augmentation

In this Help Net Security interview, Tim Bramble, Director of Threat Detection and Response at OpenText, discusses how SOC teams…

Cloudflare mitigates largest-ever DDoS attack at 22.2 Tbps
24
Sep
2025

Cloudflare mitigates largest-ever DDoS attack at 22.2 Tbps

Cloudflare mitigates largest-ever DDoS attack at 22.2 Tbps Pierluigi Paganini September 24, 2025 Cloudflare blocked a new record-breaking DDoS attack…

New “YiBackdoor” Malware Lets Hackers Run Commands and Steal Data
24
Sep
2025

New “YiBackdoor” Malware Lets Hackers Run Commands and Steal Data

Cybersecurity researchers at Zscaler ThreatLabz have identified a sophisticated new malware strain dubbed YiBackdoor, first detected in June 2025. This…

Nosey Parker: Open-source tool finds sensitive information in textual data and Git history
24
Sep
2025

Nosey Parker: Open-source tool finds sensitive information in textual data and Git history

Nosey Parker is an open-source command-line tool that helps find secrets and sensitive information hidden in text files. It works…

Building AI responsibly from day one
24
Sep
2025

Building AI responsibly from day one

In this Help Net Security video, David Hardoon, Global Head of AI Enablement at Standard Chartered, discusses the role of…

Optus says traffic not diverted away from firewall before upgrade
24
Sep
2025

Optus says traffic not diverted away from firewall before upgrade

A firewall upgrade at Optus that caused Triple Zero calls to fail for 13 hours did not follow internal traffic…

A look inside 1,000 cyber range events and what they reveal about AppSec
24
Sep
2025

A look inside 1,000 cyber range events and what they reveal about AppSec

Software powers almost every part of business, which means attackers have more chances than ever to exploit insecure code. A…

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System
24
Sep
2025

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Google has issued an urgent security update for its Chrome web browser to address three high-severity vulnerabilities that could allow…

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware
24
Sep
2025

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware

Zloader, a sophisticated Zeus-based modular trojan that first emerged in 2015, has undergone a significant transformation from its original banking-focused…

Researchers uncover polished ShadowV2 DDoS-as-a-service cloud botnet
24
Sep
2025

Researchers uncover polished ShadowV2 DDoS-as-a-service cloud botnet

Cyber security researchers have uncovered a sophisticated distributed denial-of-service (DDoS) operation that they say blurs the line between traditional malware…

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access
24
Sep
2025

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Cybersecurity professionals are facing an unprecedented acceleration in threat actor capabilities as the average breakout time—the period from initial access…

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code
24
Sep
2025

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

A sophisticated malware campaign has emerged in the npm ecosystem, utilizing an innovative steganographic technique to conceal malicious code within…