Author: Cybernoz

Kubernetes C# Client Vulnerability Exposes API Server Communication To MiTM Attack
17
Sep
2025

Kubernetes C# Client Vulnerability Exposes API Server Communication To MiTM Attack

A medium-severity vulnerability has been discovered in the official Kubernetes C# client, which could allow an attacker to intercept and…

Apple Patches 0-Day Vulnerabilities in Older iPhones and iPads
17
Sep
2025

Apple Patches 0-Day Vulnerabilities in Older iPhones and iPads

Apple has released critical security updates for older iPhone and iPad models, addressing a zero-day vulnerability that has reportedly been…

Siren’s K9 uses AI to turn complex investigations into actionable insights
17
Sep
2025

Siren’s K9 uses AI to turn complex investigations into actionable insights

Siren announced the launch of K9, an AI companion designed to transform the way investigators uncover threats and connections. K9…

AI Data Security
17
Sep
2025

Rethinking AI Data Security: A Buyer’s Guide 

Sep 17, 2025The Hacker NewsAI Security / Shadow IT Generative AI has gone from a curiosity to a cornerstone of…

Lufthansa pilots EU Digital Identity Wallet-based travel
17
Sep
2025

Lufthansa pilots EU Digital Identity Wallet-based travel

Lufthansa is working with IT supplier Amadeus to test out the use of a mobile phone-based ID that will fast-track…

Wi-Fi attack
17
Sep
2025

Decade-Old Pixie Dust Wi-Fi Hack Still Impacts Many Devices

Many devices are still vulnerable to a Wi-Fi attack method disclosed more than a decade ago, software and firmware supply…

How to Hack Web Assembly
17
Sep
2025

Beginner’s Guide: Creating Your First Crystal Project

A step-by-step tutorial to install Crystal and create, run, test, and build your first project using shards. Getting started with…

Google Announces Full Availability of Client-Side Encryption for Google Sheets
17
Sep
2025

Google Announces Full Availability of Client-Side Encryption for Google Sheets

Google has announced the full general availability of client-side encryption (CSE) for Google Sheets. This significant upgrade gives organizations direct…

Chaos Mesh Critical Vulnerabilities Expose Kubernetes Clusters to Takeover
17
Sep
2025

Chaos Mesh Critical Vulnerabilities Expose Kubernetes Clusters to Takeover

Security Research recently uncovered four new flaws, CVE-2025-59358, CVE-2025-59359, CVE-2025-59360, and CVE-2025-59361, in the default configuration of the Chaos Controller…

Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster
17
Sep
2025

Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster

Critical vulnerabilities were identified in Chaos Mesh, a popular Cloud Native Computing Foundation chaos engineering platform used for fault injection…

Hackers Exploit AdaptixC2, an Emerging Open-Source C2 Tool
17
Sep
2025

Hackers Exploit AdaptixC2, an Emerging Open-Source C2 Tool

In early May 2025, Unit 42 researchers observed that AdaptixC2 was used to infect several systems. While many C2 frameworks…

An airplane in the sky
17
Sep
2025

Airline data broker selling 5 billion passenger records to US government

We already knew that the US airline industry gave the government access to passenger records. However, this week it emerged…