Author: Cybernoz

Google Chrome 0-Day Vulnerability Actively Exploited in the Wild
18
Sep
2025

Google Chrome 0-Day Vulnerability Actively Exploited in the Wild

Google has released an emergency security update for its Chrome web browser to address a high-severity zero-day vulnerability that is…

China’s annual security and defence dialogue, the Xiangshan Forum, opened on Thursday. Photo: AP
18
Sep
2025

Takeaways from Chinese Defence Minister Dong Jun’s speech at Xiangshan Forum

During his 30-minute keynote speech Dong addressed key issues, including Taiwan, the South China Sea and China’s take on regional…

Podcast: Data sovereignty and what you need to do about it
18
Sep
2025

Podcast: Data sovereignty and what you need to do about it

In this podcast, we ask Patrick Smith, EMEA chief technology officer at Pure Storage, about the increased drive towards ensuring…

Heightened global risk pushes interest in data sovereignty
18
Sep
2025

Heightened global risk pushes interest in data sovereignty

Heightened risk related to data sovereignty is universally acknowledged. Most IT decision makers see that risk increasing as a result…

18
Sep
2025

NSW gov third party-linked cyber incidents quadruple in two years

Cyber incidents linked to third-party systems used by the NSW government have more than quadrupled over the past two years,…

China-Aligned TA415 Hackers Uses Google Sheets and Google Calendar for C2 Communications
18
Sep
2025

China-Aligned TA415 Hackers Uses Google Sheets and Google Calendar for C2 Communications

The Chinese state-sponsored threat actor TA415 has evolved its tactics, techniques, and procedures by leveraging legitimate cloud services like Google…

Data breach
18
Sep
2025

ShinyHunters claims 1.5 billion Salesforce records stolen in Drift hacks

The ShinyHunters extortion group claims to have stolen over 1.5 billion Salesforce records from 760 companies using compromised Salesloft Drift OAuth…

MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints
18
Sep
2025

MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints

Since early 2025, cybersecurity teams have observed a marked resurgence in operations attributed to MuddyWater, an Iranian state–sponsored advanced persistent…

Jaguar Land Rover Cyberattack Sparks Production, Layoff Fears
17
Sep
2025

Jaguar Land Rover Cyberattack Sparks Production, Layoff Fears

The Jaguar Land Rover cyberattack that has shuttered production lines since September 1 will extend for at least another week,…

Microsoft outs Nigerian as RaccoonO365 PhaaS boss
17
Sep
2025

Microsoft outs Nigerian as RaccoonO365 PhaaS boss

The Digital Crimes Unit (DCU) at Microsoft said it has disrupted a global phishing operation called RaccoonO365, uncloaking the leader…

China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy
17
Sep
2025

China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy

China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy Pierluigi Paganini September 17, 2025 China-linked…

Matt Kapko
17
Sep
2025

Attack on SonicWall’s cloud portal exposes customers’ firewall configurations

SonicWall said it confirmed an attack on its MySonicWall.com platform that exposed customers’ firewall configuration files — the latest in…