Author: Cybernoz

SetupHijack Tool Abuses Race Conditions in Windows Installer to Hijack Setups
25
Sep
2025

SetupHijack Tool Abuses Race Conditions in Windows Installer to Hijack Setups

Security researchers at Hacker House have released SetupHijack, a proof-of-concept tool that exploits race conditions and insecure file handling in…

North Korean IT workers use fake profiles to steal crypto
25
Sep
2025

North Korean IT workers use fake profiles to steal crypto

ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active…

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed
25
Sep
2025

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

Sep 25, 2025Ravie LakshmananSoftware Security / Malware Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called…

Zoom includes AI at no extra cost to crack enterprise adoption puzzle
25
Sep
2025

Zoom includes AI at no extra cost to crack enterprise adoption puzzle

Zoom has thrown down the gauntlet in the enterprise artificial intelligence (AI) race, with the announcement that AI Companion 3.0…

25
Sep
2025

Cisco Patches Zero-Day Flaw Affecting Routers and Switches

Cisco on Wednesday announced patches for 14 vulnerabilities in IOS and IOS XE, including a bug that has been exploited…

Numerous Applications Using Google's Firebase Platform Leaking Highly Sensitive Data
25
Sep
2025

Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data

Numerous mobile applications have been found to expose critical user information through misconfigured Firebase services, allowing unauthenticated attackers to access…

Malware Deployment via Copyright Takedown Claims by Threat Actors
25
Sep
2025

Malware Deployment via Copyright Takedown Claims by Threat Actors

Threat actors from the Lone None group are exploiting copyright takedown notices to distribute sophisticated malware, including Pure Logs Stealer…

GenAI is exposing sensitive data at scale
25
Sep
2025

GenAI is exposing sensitive data at scale

Sensitive data is everywhere and growing fast. A new report from Concentric AI highlights how unstructured data, duplicate files, and…

Cisco confirms active exploitation of ISE and ISE-PIC flaws
25
Sep
2025

Cisco fixed actively exploited zero-day in Cisco IOS and IOS XE software

Cisco fixed actively exploited zero-day in Cisco IOS and IOS XE software Pierluigi Paganini September 25, 2025 Cisco addressed a…

New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic
25
Sep
2025

New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic

Organizations commonly allow traffic to core services like Google Meet, YouTube, Chrome update servers, and Google Cloud Platform (GCP) to…

Hackers Deploy Stealthy Malware on WordPress Sites to Gain Admin Access
25
Sep
2025

Hackers Deploy Stealthy Malware on WordPress Sites to Gain Admin Access

Attackers have stepped up their tactics by deploying stealthy backdoors disguised as legitimate WordPress components, ensuring persistent administrative access even…

Secure Code Warrior gives CISOs visibility into developer AI tool usage
25
Sep
2025

Secure Code Warrior gives CISOs visibility into developer AI tool usage

Secure Code Warrior has launched a beta program to expand the AI capabilities of its Trust Agent product. The new…