Author: Cybernoz
A newly discovered ransomware group called Yurei has emerged with sophisticated encryption capabilities, targeting organizations through double-extortion tactics while leveraging…
Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI…
Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…
UK ICO finds students behind majority of school data breaches Pierluigi Paganini September 15, 2025 UK ICO reports students caused…
Two critical vulnerabilities have been discovered in the Linux Common Unix Printing System (CUPS), exposing millions of systems to remote…
A massive data breach has exposed the inner workings of China’s internet censorship system, with over 500GB of sensitive documents…
Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to…
Phishing-as-a-Service operation called VoidProxy that uses advanced adversary-in-the-middle techniques to bypass traditional multi-factor authentication and steal session tokens from Microsoft…
In the world of extreme sports, where split-second decisions and real-time data can define victory, reliable, high-performance connectivity is no…
A new proof-of-concept (PoC) tool named BitlockMove demonstrates a novel lateral movement technique that leverages BitLocker’s Distributed Component Object Model…
Authorities in Malaysia are hunting the suspect behind a blackmail attempt on at least 10 lawmakers who received emails demanding…
A suspected North Korean state-sponsored hacking group used ChatGPT to create a deepfake of a military ID document to attack…











