Author: Cybernoz

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys
26
Sep
2025

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys

Cybercriminals have launched a sophisticated supply chain attack targeting cryptocurrency developers through malicious Rust crates designed to steal digital wallet…

Hackers Breach Active Directory, Steal NTDS.dit for Full Domain Compromise
26
Sep
2025

Hackers Breach Active Directory, Steal NTDS.dit for Full Domain Compromise

Threat actors recently infiltrated a corporate environment, dumped the AD database file NTDS.dit, and nearly achieved full domain control. AD…

Fortra GoAnywhere MFT CVE-2025-10035
26
Sep
2025

Recent Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day

Exploitation of a recently disclosed Fortra GoAnywhere MFT vulnerability started at least one week before patches were released, cybersecurity firm…

Product update: Dynamic API Scanning, Recommendations and Classifications, and more
26
Sep
2025

Product update: Dynamic API Scanning, Recommendations and Classifications, and more

We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you…

Critical Cisco Vulnerability Let Remote Attackers Execute Arbitrary Code on Firewalls and Routers
26
Sep
2025

Critical Cisco Vulnerability Let Remote Attackers Execute Arbitrary Code on Firewalls and Routers

Cisco warns of a Critical remote code execution flaw in web services across multiple Cisco platforms.  Tracked as CVE-2025-20363 (CWE-122),…

Unveiling LummaStealer's Technical Details Through ML-Based Detection Approach
26
Sep
2025

Unveiling LummaStealer’s Technical Details Through ML-Based Detection Approach

In early 2025, LummaStealer was in widespread use by cybercriminals targeting victims throughout the world in multiple industry verticals, including…

Print Friendly, PDF & Email
26
Sep
2025

The Real Cost of OT Cyber: Why Process-Level Security Is a Financial Decision

The threat of an OT cyber-attack isn’t just an operational risk. It’s also a financial one. Companies across critical infrastructure…

AI infrastucture provider Nscale secures $1.1bn in series B funding
26
Sep
2025

AI infrastucture provider Nscale secures $1.1bn in series B funding

Artificial intelligence (AI) infrastructure provider Nscale has secured $1.1bn in series B funding, a week after it was announced the…

An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration
26
Sep
2025

An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration

A novel AI-driven threat leverages LLMs on Hugging Face to execute adaptive reconnaissance and data exfiltration in real time. Rather…

Dutch intelligence warns that China-linked APT Salt Typhoon targeted local critical infrastructure
26
Sep
2025

Google warns of Brickstorm backdoor targeting U.S. legal and tech sectors

Google warns of Brickstorm backdoor targeting U.S. legal and tech sectors Pierluigi Paganini September 26, 2025 China-linked actors used Brickstorm…

Hackers Exploiting Cisco ASA Zero-Day to Deploy RayInitiator and LINE VIPER Malware
26
Sep
2025

Hackers Exploiting Cisco ASA Zero-Day to Deploy RayInitiator and LINE VIPER Malware

Cybersecurity authorities are urging organizations to take immediate action following the discovery of a sophisticated espionage campaign targeting Cisco Adaptive…

Critical Cisco Flaw Lets Remote Attackers Execute Code on Firewalls and Routers
26
Sep
2025

Critical Cisco Flaw Lets Remote Attackers Execute Code on Firewalls and Routers

Cisco published Security Advisory cisco-sa-http-code-exec-WmfP3h3O revealing a severe flaw in multiple Cisco platforms that handle HTTP-based management. Tracked as CVE-2025-20363,…