Author: Cybernoz

Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information
25
Sep
2025

Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information

A critical vulnerability in Hikvision security cameras, first disclosed in 2017, is being actively exploited by hackers to gain unauthorized…

BRICKSTORM Backdoor Hits Tech and Legal Firms with Stealthy New Campaign
25
Sep
2025

BRICKSTORM Backdoor Hits Tech and Legal Firms with Stealthy New Campaign

Persistent, stealthy, and cross-platform, the BRICKSTORM backdoor has emerged as a significant threat to U.S. technology and legal organizations. Tracked…

Predicting DDoS attacks: How deep learning could give defenders an early warning
25
Sep
2025

Predicting DDoS attacks: How deep learning could give defenders an early warning

Distributed denial-of-service (DDoS) attacks remain one of the most common and disruptive forms of cybercrime. Defenders have traditionally focused on…

BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features
25
Sep
2025

BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features

Critical vulnerabilities discovered in Supermicro Baseboard Management Controller (BMC) firmware have exposed a troubling pattern where inadequate security fixes create…

Linux Kernel ksmbd Flaw Lets Remote Attackers Execute Arbitrary Code
25
Sep
2025

Linux Kernel ksmbd Flaw Lets Remote Attackers Execute Arbitrary Code

A critical vulnerability in the Linux Kernel’s ksmbd file sharing component allows remote attackers to execute code with kernel privileges….

$439 million recovered in global financial crime crackdown
25
Sep
2025

$439 million recovered in global financial crime crackdown

Authorities around the world have recovered $439 million from criminals following a months-long operation led by INTERPOL. The effort, called…

NVIDIA Merlin Flaw Enables Remote Code Execution with Root Access
25
Sep
2025

NVIDIA Merlin Flaw Enables Remote Code Execution with Root Access

A critical vulnerability in NVIDIA’s Merlin Transformers4Rec library allows attackers to achieve remote code execution with root privileges. Discovered by…

New framework sets baseline for SaaS security controls
25
Sep
2025

New framework sets baseline for SaaS security controls

Managing security across dozens or even hundreds of SaaS apps has become a major headache. Each tool has its own…

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps
25
Sep
2025

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

A sophisticated cybercriminal campaign has emerged targeting Indonesian and Vietnamese Android users with banking trojans disguised as legitimate government identity…

Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts
25
Sep
2025

Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts

A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening websites powered by this widely-used…

Cyber compliance often overlooks third-party risks, warns Identifly CSO
25
Sep
2025

Cyber compliance often overlooks third-party risks, warns Identifly CSO

Aaron Finnis, chief strategy officer at Identity and Access Management (IAM) specialist Identifly, has echoed others in the cybersecurity industry…

Australian Gas Infrastructure Group in second phase of CRM transformation
25
Sep
2025

Australian Gas Infrastructure Group in second phase of CRM transformation

Australian Gas Infrastructure Group is entering the second phase of a CRM transformation, with an end goal of establishing a…