Author: Cybernoz

Unpatched flaw in OnePlus phones lets rogue apps text messages
24
Sep
2025

Unpatched flaw in OnePlus phones lets rogue apps text messages

A vulnerability in multiple versions of OxygenOS, the Android-based operating system from OnePlus, allows any installed app to access SMS…

RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders
24
Sep
2025

RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders

Three sophisticated malware families have emerged as significant threats to telecommunications and manufacturing sectors across Central and South Asia, representing…

GitHub Hosts Malware from Malwarebytes, LastPass, Citibank, SentinelOne, and More
24
Sep
2025

GitHub Hosts Malware from Malwarebytes, LastPass, Citibank, SentinelOne, and More

A large-scale campaign targeting Mac users is leveraging fake GitHub pages to distribute information-stealing malware disguised as popular legitimate applications….

AI's power play: the high-stakes race for energy capacity
24
Sep
2025

FT 250 executives call for UK grid upgrades to support AI datacentre expansion plans

If the UK’s digital economy is to enjoy a prosperous future, the nation’s electricity grids need to be urgently upgraded…

Flights across Europe delayed after cyberattack targets third-party vendor
24
Sep
2025

UK authorities arrest man in connection with cyberattack against aviation vendor

U.K. authorities on Wednesday said a man in his 40s has been arrested in connection to the hack of Collins…

Police raid
24
Sep
2025

Police seizes $439 million stolen by cybercrime rings worldwide

In a five-month joint operation led by Interpol, law enforcement agencies have seized more than $439 million in cash and…

Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access
24
Sep
2025

Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) enables attackers to achieve arbitrary code execution, privilege escalation, and SYSTEM-level…

Artificial Intelligence – Supported Internet of Things Security
24
Sep
2025

Artificial Intelligence – Supported Internet of Things Security

Transforming digital technology landscape and encompassing global product and service marketplace are crucial challenges of industry 4.0. Novel times have…

Multiple Apps on Google's Firebase Platform Exposing Sensitive Data
24
Sep
2025

Multiple Apps on Google’s Firebase Platform Exposing Sensitive Data

A comprehensive security analysis has revealed a widespread vulnerability affecting Firebase-powered mobile applications, with over 150 popular apps inadvertently exposing…

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors
24
Sep
2025

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been…

UK government to address balancing energy sustainability with AI growth demands
24
Sep
2025

Nscale explained: Everything you need to know

The UK government has set itself an ambitious target of becoming an artificial intelligence (AI) superpower, and this is a…

Nation-State hackers exploit Libraesva Email Gateway flaw
24
Sep
2025

Nation-State hackers exploit Libraesva Email Gateway flaw

Pierluigi Paganini September 24, 2025 State-sponsored hackers exploited a vulnerability, tracked as CVE-2025-59689, in Libraesva Email Gateway via malicious attachments….