Author: Cybernoz

Greenshot Vulnerability POC
18
Sep
2025

Greenshot Vulnerability Exposes Windows To Code Execution

A security vulnerability has been discovered in Greenshot, the widely used open-source screenshot tool for Windows. The Greenshot vulnerability exposes…

Insight Partners ransomware data breach
18
Sep
2025

Insight Partners Confirms Data Breach Result of Ransomware Attack

Venture capital firm Insight Partners has revealed that the data breach disclosed earlier this year was the result of a…

TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections
18
Sep
2025

TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2025-9961, has been discovered in TP-Link routers. Security research firm…

Absolute Security Rehydrate restores compromised endpoints
18
Sep
2025

Absolute Security Rehydrate restores compromised endpoints

Absolute Security released Rehydrate, empowering enterprises to recover from IT or cyber incidents remotely and at scale to minimize operational…

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions
18
Sep
2025

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions

Sep 18, 2025Ravie LakshmananVulnerability / Browser Security Google on Wednesday released security updates for the Chrome web browser to address…

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network
18
Sep
2025

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network

The newly publicized Pixie Dust attack has once again exposed the critical vulnerabilities inherent in the Wi-Fi Protected Setup (WPS)…

Malicious Typosquatted PyPI Packages Spreading SilentSync RAT
18
Sep
2025

Malicious Typosquatted PyPI Packages Spreading SilentSync RAT

On August 4, 2025, Zscaler ThreatLabz uncovered two malicious Python packages—sisaws and secmeasure—that deliver SilentSync, a Python-based remote access trojan…

Behind the scenes of cURL with its founder: Releases, updates, and security
18
Sep
2025

Behind the scenes of cURL with its founder: Releases, updates, and security

In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure…

Hackers Abuse RTL/LTR Text Tricks and Browser Flaws to Mask Malicious Links
18
Sep
2025

Hackers Abuse RTL/LTR Text Tricks and Browser Flaws to Mask Malicious Links

Cybersecurity researchers at Varonis Threat Labs have uncovered a persistent vulnerability that has remained unaddressed for over a decade, allowing…

Product showcase: Exaforce - The full lifecycle AI SOC platform
18
Sep
2025

Product showcase: Exaforce – The full lifecycle AI SOC platform

Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave…

Google Chrome 0-Day Under Active Attack – Update Immediately
18
Sep
2025

Google Chrome 0-Day Under Active Attack – Update Immediately

Google has released an urgent security update for Chrome browser users worldwide, addressing four critical vulnerabilities, including one zero-day exploit…

Shadow AI is breaking corporate security from within
18
Sep
2025

Shadow AI is breaking corporate security from within

Cybersecurity leaders know the attack surface has been growing for years, but the latest State of Information Security Report 2025…