Author: Cybernoz
Since early 2025, the cybersecurity community has witnessed an unprecedented surge in distributed denial-of-service (DDoS) bandwidth, culminating in a record-shattering…
Unvetted Model Context Protocol (MCP) servers introduce a stealthy supply chain attack vector, enabling adversaries to harvest credentials, configuration files,…
ShinyHunters reportedly hacked Kering, exposing Gucci, Balenciaga and Alexander McQueen customer data, raising risks of scams and spear phishing. The…
Looking at our team’s recent text messages, you’d think that remote online evaluators are in high demand right now. Several…
Fraud prevention and AML compliance firm SEON today announced raising $80 million in Series C funding, which brings the total…
Two critical vulnerabilities, CVE-2025-41248 and CVE-2025-41249, have emerged in Spring Security and Spring Framework that could allow attackers to bypass…
A pair of medium-severity vulnerabilities in the Spring Framework and Spring Security libraries were disclosed on September 15, 2025. Both…
This year’s Top 10 emerging technologies in 2025 report from Forrester has positioned generative artificial intelligence (GenAI) as a technology…
Bootstrapped endpoint security company Remedio, which until Monday was known as Gytpol, has announced raising $65 million. The Israeli company’s…
SmokeLoader, first seen on criminal forums in 2011, has evolved into a highly modular malware loader designed to deliver a…
A new variation of the Rowhammer attack, named Phoenix, breaks through the built-in defenses of modern DDR5 memory modules. Researchers reverse-engineered…
GitHub is adding post-quantum cryptography to secure SSH connections, a move that signals the company’s preparation for a time when…










