Author: Cybernoz

South East Water modernises through Google Cloud
26
Sep
2025

Amazon joins coalition to reduce water usage habits of AI datacentres

Amazon is part of a coalition focused on ensuring artificial intelligence (AI) datacentres use water as efficiently as possible, amid…

XCSSET, macOS, macOS Malware
26
Sep
2025

XCSSET Malware Mutates Again, Expands Reach To Firefox

Microsoft researchers say the long-running XCSSET malware has resurfaced with a new arsenal of tricks aimed at stealing data, persisting…

Product comparison: Detectify vs. Burp Enterprise
26
Sep
2025

Product comparison: Detectify vs. Burp Enterprise

Burp Enterprise Pros: Offers granular control and customization to fit the distinct needs of a mature security program. Empowers expert…

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys
26
Sep
2025

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys

Cybercriminals have launched a sophisticated supply chain attack targeting cryptocurrency developers through malicious Rust crates designed to steal digital wallet…

Hackers Breach Active Directory, Steal NTDS.dit for Full Domain Compromise
26
Sep
2025

Hackers Breach Active Directory, Steal NTDS.dit for Full Domain Compromise

Threat actors recently infiltrated a corporate environment, dumped the AD database file NTDS.dit, and nearly achieved full domain control. AD…

Fortra GoAnywhere MFT CVE-2025-10035
26
Sep
2025

Recent Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day

Exploitation of a recently disclosed Fortra GoAnywhere MFT vulnerability started at least one week before patches were released, cybersecurity firm…

Product update: Dynamic API Scanning, Recommendations and Classifications, and more
26
Sep
2025

Product update: Dynamic API Scanning, Recommendations and Classifications, and more

We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you…

Critical Cisco Vulnerability Let Remote Attackers Execute Arbitrary Code on Firewalls and Routers
26
Sep
2025

Critical Cisco Vulnerability Let Remote Attackers Execute Arbitrary Code on Firewalls and Routers

Cisco warns of a Critical remote code execution flaw in web services across multiple Cisco platforms.  Tracked as CVE-2025-20363 (CWE-122),…

Unveiling LummaStealer's Technical Details Through ML-Based Detection Approach
26
Sep
2025

Unveiling LummaStealer’s Technical Details Through ML-Based Detection Approach

In early 2025, LummaStealer was in widespread use by cybercriminals targeting victims throughout the world in multiple industry verticals, including…

Print Friendly, PDF & Email
26
Sep
2025

The Real Cost of OT Cyber: Why Process-Level Security Is a Financial Decision

The threat of an OT cyber-attack isn’t just an operational risk. It’s also a financial one. Companies across critical infrastructure…

AI infrastucture provider Nscale secures $1.1bn in series B funding
26
Sep
2025

AI infrastucture provider Nscale secures $1.1bn in series B funding

Artificial intelligence (AI) infrastructure provider Nscale has secured $1.1bn in series B funding, a week after it was announced the…

An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration
26
Sep
2025

An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration

A novel AI-driven threat leverages LLMs on Hugging Face to execute adaptive reconnaissance and data exfiltration in real time. Rather…