Author: Cybernoz

Apple vulnerabilities
16
Sep
2025

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities

Apple on Monday announced the release of major iOS and macOS platform updates with fixes for a total of more…

New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials
16
Sep
2025

New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials

Since May 2025, a novel credential stealer dubbed Maranhão Stealer has emerged as a significant threat to users of pirated…

AISURU Botnet Fuels Record-Breaking 11.5 Tbps DDoS Attack With 300,000 Hijacked Routers
16
Sep
2025

AISURU Botnet Fuels Record-Breaking 11.5 Tbps DDoS Attack With 300,000 Hijacked Routers

The newly identified AISURU botnet, leveraging an estimated 300,000 compromised routers worldwide, has been pinpointed as the force behind a…

Dutch intelligence warns that China-linked APT Salt Typhoon targeted local critical infrastructure
16
Sep
2025

China-linked Mustang Panda deploys advanced SnakeDisk USB worm

China-linked Mustang Panda deploys advanced SnakeDisk USB worm Pierluigi Paganini September 16, 2025 China-linked APT group Mustang Panda has been spotted…

Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence
16
Sep
2025

Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence

A groundbreaking open-source benchmark suite called CyberSOCEval has emerged as the first comprehensive evaluation framework for Large Language Models (LLMs)…

Apple Releases Security Update Patching Multiple Vulnerabilities in iOS 26 and iPadOS 26
16
Sep
2025

Apple Releases Security Update Patching Multiple Vulnerabilities in iOS 26 and iPadOS 26

Apple has released a comprehensive security update for iOS 26 and iPadOS 26, addressing 27 vulnerabilities across multiple system components. The update,…

OT security needs continuous operations, not one-time fixes
16
Sep
2025

OT security needs continuous operations, not one-time fixes

Cyberattacks keep hitting the OT systems that critical infrastructure operators run, according to new research from Forrester. In a survey…

RowHammer Attack
16
Sep
2025

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

Sep 16, 2025Ravie LakshmananHardware Security / Vulnerability A team of academics from ETH Zürich and Google has discovered a new…

Google introduces VaultGemma, a differentially private LLM built for secure data handling
16
Sep
2025

Google introduces VaultGemma, a differentially private LLM built for secure data handling

Google has released VaultGemma, a large language model designed to keep sensitive data private during training. The model uses differential…

Insider breach at FinWise Bank exposes data of 689,000 AFF customers
16
Sep
2025

Insider breach at FinWise Bank exposes data of 689,000 AFF customers

Insider breach at FinWise Bank exposes data of 689,000 AFF customers Pierluigi Paganini September 16, 2025 An ex-employee caused an…

New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips
16
Sep
2025

New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips

A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed….

Building security that protects customers, not just auditors
16
Sep
2025

Building security that protects customers, not just auditors

In this Help Net Security interview, Nir Rothenberg, CISO at Rapyd, discusses global differences in payment security maturity and the…