Author: Cybernoz

AISURU Botnet With 300,000 Hijacked Routers Behind The Recent Massive 11.5 Tbps DDoS Attack
16
Sep
2025

AISURU Botnet With 300,000 Hijacked Routers Behind The Recent Massive 11.5 Tbps DDoS Attack

Since early 2025, the cybersecurity community has witnessed an unprecedented surge in distributed denial-of-service (DDoS) bandwidth, culminating in a record-shattering…

Threat Actors Exploit MCP Servers to Steal Sensitive Data
16
Sep
2025

Threat Actors Exploit MCP Servers to Steal Sensitive Data

Unvetted Model Context Protocol (MCP) servers introduce a stealthy supply chain attack vector, enabling adversaries to harvest credentials, configuration files,…

Gucci, Balenciaga and Alexander McQueen Breach Linked to ShinyHunters
16
Sep
2025

Gucci, Balenciaga and Alexander McQueen Breach Linked to ShinyHunters

ShinyHunters reportedly hacked Kering, exposing Gucci, Balenciaga and Alexander McQueen customer data, raising risks of scams and spear phishing. The…

the job offer sounds great
16
Sep
2025

Watch out for the “We are hiring” remote online evaluator message scam

Looking at our team’s recent text messages, you’d think that remote online evaluators are in high demand right now. Several…

MIND Raises $30 Million for Data Loss Prevention
16
Sep
2025

Fraud Prevention Company SEON Raises $80 Million in Series C Funding

Fraud prevention and AML compliance firm SEON today announced raising $80 million in Series C funding, which brings the total…

Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues
16
Sep
2025

Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues

Two critical vulnerabilities, CVE-2025-41248 and CVE-2025-41249, have emerged in Spring Security and Spring Framework that could allow attackers to bypass…

Spring Framework Security Flaws Allow Authorization Bypass and Annotation Detection Issues
16
Sep
2025

Spring Framework Security Flaws Allow Authorization Bypass and Annotation Detection Issues

A pair of medium-severity vulnerabilities in the Spring Framework and Spring Security libraries were disclosed on September 15, 2025. Both…

Forrester Technology & Innovation Summit preview: Preparing for emerging tech
16
Sep
2025

Forrester Technology & Innovation Summit preview: Preparing for emerging tech

This year’s Top 10 emerging technologies in 2025 report from Forrester has positioned generative artificial intelligence (GenAI) as a technology…

MIND Raises $30 Million for Data Loss Prevention
16
Sep
2025

Endpoint Security Firm Remedio Raises $65 Million in First Funding Round

Bootstrapped endpoint security company Remedio, which until Monday was known as Gytpol, has announced raising $65 million. The Israeli company’s…

SmokeLoader Utilizes Optional Plugins To Perform Tasks Such as Stealing Data and DoS Attacks
16
Sep
2025

SmokeLoader Utilizes Optional Plugins To Perform Tasks Such as Stealing Data and DoS Attacks

SmokeLoader, first seen on criminal forums in 2011, has evolved into a highly modular malware loader designed to deliver a…

New Phoenix Rowhammer Attack Bypasses DDR5 Chip Protections
16
Sep
2025

New Phoenix Rowhammer Attack Bypasses DDR5 Chip Protections

A new variation of the Rowhammer attack, named Phoenix, breaks through the built-in defenses of modern DDR5 memory modules. Researchers reverse-engineered…

GitHub adds post-quantum protection for SSH access
16
Sep
2025

GitHub adds post-quantum protection for SSH access

GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company’s preparation for a time when…