Author: Cybernoz

Cyber Attack Exposes LNER Train Passengers' Personal Data
11
Sep
2025

Cyber Attack Exposes LNER Train Passengers’ Personal Data

London North Eastern Railway (LNER) has confirmed that an unauthorized breach at one of its third-party suppliers exposed contact details…

Senator Urges FTC Probe Into Microsoft After Ascension Ransomware Attack
11
Sep
2025

Senator Urges FTC Probe Into Microsoft After Ascension Ransomware Attack

US Senator Ron Wyden urges the FTC to investigate Microsoft after its software contributed to a major ransomware attack on…

Microsoft Teams
11
Sep
2025

Microsoft adds malicious link warnings to Teams private chats

Microsoft Teams will automatically alert users when they send or receive a private message containing links that are tagged as…

New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs
11
Sep
2025

New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs

A novel speculative execution attack named VMSCAPE allows a malicious virtual machine (VM) to breach its security boundaries and steal…

Attackers Abuse Kubernetes DNS to Extract Git Credentials from ArgoCD
11
Sep
2025

Attackers Abuse Kubernetes DNS to Extract Git Credentials from ArgoCD

A newly discovered attack method targeting ArgoCD and Kubernetes that could give red-teamers fresh ammo and blue-teamers fresh headaches. This…

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence
11
Sep
2025

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence

U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for…

SonicWall
11
Sep
2025

Akira ransomware exploiting critical SonicWall SSLVPN bug again

The Akira ransomware gang is actively exploiting CVE-2024-40766, a year-old critical-severity access control vulnerability, to gain unauthorized access to SonicWall devices. The…

What You Need to Pay Attention to Right Now 
11
Sep
2025

What You Need to Pay Attention to Right Now 

Cyber attackers constantly refine their evasion methods. That’s what makes threats, including phishing, increasingly hard to detect and investigate. Kits…

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
11
Sep
2025

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity

Sep 11, 2025Ravie LakshmananArtificial Intelligence / Mobile Security Google on Tuesday announced that its new Google Pixel 10 phones support…

Black Hat USA: Startup breaks secrets management tools
11
Sep
2025

Chat Control: EU to decide on requirement for tech firms to scan encrypted messages

Law enforcement experts and policymakers are due to meet on 12 September to decide on proposals to require technology companies,…

Fake Microsoft Office add-in tools push malware via SourceForge
11
Sep
2025

New VMScape attack breaks guest-host isolation on AMD, Intel CPUs

A new Spectre-like attack dubbed VMScape allows a malicious virtual machine (VM) to leak cryptographic keys from an unmodified QEMU…

Threat Actors Leveraging Open-Source AdaptixC2 in Real-world Attacks
11
Sep
2025

Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks

In early May 2025, security teams began observing a sudden rise in post-exploitation activity leveraging an open-source command-and-control framework known…