Author: Cybernoz

Kali Linux
12
Dec
2025

Kali Linux 2025.4 released with 3 new tools, desktop updates

Kali Linux has released version 2025.4, its final update of the year, introducing three new tools, desktop environment improvements, and…

Surge in Attacks Targeting RSC-Enabled Services Worldwide
12
Dec
2025

Surge in Attacks Targeting RSC-Enabled Services Worldwide

Torrance, United States / California, December 12th, 2025, CyberNewsWire In December 2025, CVE-2025-55182 (React2Shell), a vulnerability in React Server Components…

Google ads funnel Mac users to poisoned AI chats that spread the AMOS infostealer
12
Dec
2025

Google ads funnel Mac users to poisoned AI chats that spread the AMOS infostealer

Researchers have found evidence that AI conversations were inserted in Google search results to mislead macOS users into installing the…

University of York plumps for Workday to spruce up HR and finance
12
Dec
2025

University of York plumps for Workday to spruce up HR and finance

York University has chosen HR and finance systems software-as-a-service supplier Workday to replace more than 30 HR and finance applications,…

Researchers Revive 2000s 'Blinkenlights' Technique to Dump Smartwatch Firmware via Screen Pixels
12
Dec
2025

Researchers Revive 2000s ‘Blinkenlights’ Technique to Dump Smartwatch Firmware via Screen Pixels

Security researchers have successfully extracted firmware from a budget smartwatch by bringing back a 20-year-old attack method originally used to…

What Happens Inside PDFAid in Seconds: From Upload to Download
12
Dec
2025

From Upload to Download – Hackread – Cybersecurity News, Data Breaches, AI, and More

Most people interact with PDF tools only at the surface level, such as selecting a file, clicking upload, waiting a…

Who's Patching Your Network?
12
Dec
2025

From Teen Computer Whiz To Crypto Godfather

12 Dec True Hacking Story: From Teen Computer Whiz To Crypto Godfather Posted at 09:02h in Blogs by Taylor Fox…

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
12
Dec
2025

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating…

Quantum risk to quantum readiness: A PQC roadmap
12
Dec
2025

Quantum risk to quantum readiness: A PQC roadmap

No one knows exactly when quantum computing will arrive, but accelerating progress is prompting security and IT leaders to recognise…

New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
12
Dec
2025

New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

A sophisticated phishing campaign has emerged that successfully bypasses multi-factor authentication, protecting Microsoft 365 and Okta users, representing a serious…

ImmuniWeb enhances AI vulnerability testing and compliance reporting
12
Dec
2025

ImmuniWeb enhances AI vulnerability testing and compliance reporting

ImmuniWeb has unveiled a major update to its ImmuniWeb AI Platform, based on ongoing research as well as valuable feedback…

NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems
12
Dec
2025

NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems

A sophisticated new Windows backdoor named NANOREMOTE emerged in October 2025, presenting a significant threat to enterprise environments by leveraging…