Author: Cybernoz

National cyber director says US must shift risk burden toward adversaries
10
Sep
2025

National cyber director says US must shift risk burden toward adversaries

National Cyber Director Sean Cairncross said the Trump administration plans a whole-of-nation approach in order to combat the threat of…

Apple’s new Memory Integrity Enforcement system deals a huge blow to spyware developers
10
Sep
2025

Apple’s new Memory Integrity Enforcement system deals a huge blow to spyware developers

Apple has unveiled a comprehensive security system called Memory Integrity Enforcement (MIE) that represents a five-year engineering effort to combat…

Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack
10
Sep
2025

Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack

Early this month, cybersecurity researchers uncovered a novel phishing campaign attributed to the Lazarus Group that targets developers and crypto…

More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity
10
Sep
2025

More Than Sales… How Brokers Can Play a Critical Role in Strengthening the USA’s National Cybersecurity

As cyber threats continue to rise, enterprises can rely on unexpected allies for support: their insurance brokers. Brokers are not…

AsyncRAT Leverages Fileless Techniques to Bypass Detection
10
Sep
2025

AsyncRAT Leverages Fileless Techniques to Bypass Detection

Fileless malware has become a formidable adversary for security teams, operating entirely in memory and evading disk-based detection. A recent…

DARPA’s AI Cyber Challenge reveals winning models for automated vulnerability discovery and patching
10
Sep
2025

The npm incident frightened everyone, but ended up being nothing to fret about

Security professionals and observers across the industry got swept into a pit of fear Monday when an attacker took over…

New GONEPOSTAL Malware Hijacking Outlook to Enable Command and Control Communication
10
Sep
2025

New GONEPOSTAL Malware Hijacking Outlook to Enable Command and Control Communication

In recent weeks, security teams have observed a sophisticated new strain of malware—dubbed GONEPOSTAL—that subverts Microsoft Outlook to relay command…

Here's What to Know About Poland Shooting Down Russian Drones
10
Sep
2025

Here’s What to Know About Poland Shooting Down Russian Drones

Early Wednesday morning, Poland shot down several Russian drones that had violated its airspace during a massive strike against western…

Multiple Vulnerabilities in GitLab Patched, Blocking DoS and SSRF Attack Vectors
10
Sep
2025

Multiple Vulnerabilities in GitLab Patched, Blocking DoS and SSRF Attack Vectors

GitLab has released critical security updates across multiple versions to address six significant vulnerabilities that could enable denial-of-service attacks, server-side…

Accessible AI-Powered Cybersecurity Platform for SME Security
10
Sep
2025

Accessible AI-Powered Cybersecurity Platform for SME Security

Sofia, Bulgaria, September 10th, 2025, CyberNewsWire Kikimora, a cybersecurity specialist and a product developer, has announced the launch of Kikimora…

CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
10
Sep
2025

CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems

Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based remote…

Product comparison: Detectify vs. Intruder
10
Sep
2025

Product comparison: Detectify vs. Intruder

Intruder is a cloud-based vulnerability scanner that provides an automated overview of an organization’s attack surface. Its primary function is…