Author: Cybernoz

WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System
05
Jan
2026

WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System

WhatsApp’s multi-device encryption protocol has long leaked metadata, allowing attackers to fingerprint users’ device operating systems, aiding targeted malware delivery….

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
05
Jan
2026

AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More

A new open-source tool is bridging the gap between artificial intelligence and offensive security operations.  GHOSTCREW is an advanced AI red…

How charities are using customer applications to boost support
05
Jan
2026

How charities are using customer applications to boost support

It’s a tough time in the charity sector. With the rises in cost of living and unemployment, fewer people are…

SentinelOne analysis links service disruption to software flaw
05
Jan
2026

Thousands of firewalls at risk as legacy flaw in Fortinet faces renewed threat

Researchers warn that thousands of Fortinet instances are at risk of exploitation after the company disclosed that a legacy flaw…

VSCode IDE forks expose users to
05
Jan
2026

VSCode IDE forks expose users to “recommended extension” attacks

Popular AI-powered integrated development environment solutions, such as Cursor, Windsurf, Google Antigravity, and Trae, recommend extensions that are non-existent in…

Post-Escalation Tool Designed to Achieve Red Team Objectives
05
Jan
2026

Post-Escalation Tool Designed to Achieve Red Team Objectives

ProfileHound emerges as a specialized post-exploitation instrument for offensive security professionals seeking to identify high-value targets within Active Directory environments….

An illustrated padlock is mounted into a microphone stand with sound waves emitting from the device.
05
Jan
2026

ALPRs are recording your daily drive (Lock and Code S06E26)

This week on the Lock and Code podcast… There’s an entire surveillance network popping up across the United States that…

New tech frontier as resale moves from niche to mainstream
05
Jan
2026

New tech frontier as resale moves from niche to mainstream

Recommerce, pre-loved, resale, or second-hand goods – whatever synonym one would like to use – is a big focus area…

Kimwolf botnet leverages residential proxies to hijack 2M+ Android devices
05
Jan
2026

Kimwolf botnet leverages residential proxies to hijack 2M+ Android devices

Kimwolf botnet leverages residential proxies to hijack 2M+ Android devices Pierluigi Paganini January 05, 2026 The Kimwolf botnet has infected…

Cyber risks grow as manufacturers turn to AI and cloud systems
05
Jan
2026

Cyber risks grow as manufacturers turn to AI and cloud systems

Listen to the article 7 min This audio is auto-generated. Please let us know if you have feedback. In August,…

CISOs on the line header
05
Jan
2026

Agentic AI Is an Identity Problem and CISOs Will Be Accountable for the Outcome

By Itamar Apelblat, CEO & Co-founder, Token Security If you are a CISO today, agentic AI probably feels familiar in…

Cyberattack on Higham Lane School Forced to Close its Doors to all Students and Staff
05
Jan
2026

Cyberattack on Higham Lane School Forced to Close its Doors to all Students and Staff

Higham Lane School and Sixth Form has been forced to close its doors to all students and staff this week…