Author: Cybernoz

Mitsubishi Electric agrees to buy Nozomi Networks in deal valued at about $1B
09
Sep
2025

Mitsubishi Electric agrees to buy Nozomi Networks in deal valued at about $1B

Mitsubishi Electric Corp. on Tuesday said it agreed to buy industrial cybersecurity specialist Nozomi Networks.  The deal is valued at…

Hacker
09
Sep
2025

US charges admin of LockerGoga, MegaCortex, Nefilim ransomware

The U.S. Department of Justice has charged Ukrainian national Volodymyr Viktorovich Tymoshchuk for his role as the administrator of the…

FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands
09
Sep
2025

FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands

Fortinet has disclosed a medium-severity vulnerability in its FortiDDoS-F product line that could allow a privileged attacker to execute unauthorized…

FortiDDoS Vulnerability Lets Hackers Execute Unauthorized OS Commands
09
Sep
2025

FortiDDoS Vulnerability Lets Hackers Execute Unauthorized OS Commands

Fortinet has disclosed a significant OS command injection vulnerability in its FortiDDoS-F appliances that could allow privileged attackers to execute…

New Salty2FA Phishing Kit Bypasses MFA and Clones Login Pages
09
Sep
2025

New Salty2FA Phishing Kit Bypasses MFA and Clones Login Pages

A new, sophisticated phishing kit, Salty2FA, is using advanced tactics to bypass MFA and mimic trusted brands. Read expert analysis…

National cyber director: U.S. strategy needs to shift cyber risk from Americans to its adversaries
09
Sep
2025

National cyber director: U.S. strategy needs to shift cyber risk from Americans to its adversaries

The United States needs a “new, coordinated strategy” to counter its cyber adversaries and “shift the burden of risk in…

Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure
09
Sep
2025

Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure

Salat Stealer has emerged as a pervasive threat targeting Windows endpoints with a focus on harvesting browser-stored credentials and cryptocurrency…

Exploring Key Technology Trends for 2024
09
Sep
2025

Exploring Key Technology Trends for 2024

Fast forward to today, and the importance of staying current with the latest tech trends can’t be overstated – it’s…

Multiple Vulnerabilities Discovered in Ivanti Connect Secure, Policy Secure, and ZTA Gateways
09
Sep
2025

Multiple Vulnerabilities Discovered in Ivanti Connect Secure, Policy Secure, and ZTA Gateways

Ivanti on September 9 released a security advisory detailing six medium and five high severity vulnerabilities impacting Ivanti Connect Secure, Policy Secure, ZTA Gateways,…

Republic and Incentiv Partner to Simplify and Reward Web3 Participation
09
Sep
2025

Republic and Incentiv Partner to Simplify and Reward Web3 Participation

Republic today announced a strategic partnership with Incentiv, an EVM-compatible Layer 1 blockchain designed to make Web3 simple, accessible, and…

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
09
Sep
2025

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly…

Fujitsu braced for double-digit decline triggered by ‘foolish display of legal machismo’
09
Sep
2025

Fujitsu braced for double-digit decline triggered by ‘foolish display of legal machismo’

Fujitsu expects its UK sales to see a double-digit drop as some controversial public sector wins fail to plug the…