Author: Cybernoz

Spam Campaign Distributes Fake PDFs, Installing Remote Monitoring Tools for Persistent Access
06
Feb
2026

Spam Campaign Distributes Fake PDFs, Installing Remote Monitoring Tools for Persistent Access

Security teams have discovered an active spam campaign that uses fake PDF documents to trick users into installing remote monitoring…

New Wave of Odyssey Stealer Targets macOS Users in Active Cyberattack Campaign
06
Feb
2026

New Wave of Odyssey Stealer Targets macOS Users in Active Cyberattack Campaign

A significant surge in Odyssey Stealer activity is currently targeting macOS users across multiple continents, with recent telemetry data revealing…

06
Feb
2026

February 2026 Patch Tuesday forecast: Lots of OOB love this month

Valentine’s Day is just around the corner and Microsoft has been giving us a lot of love with a non-stop…

Hackers Leveraging Windows Screensaver to Deploy RMM Tools and Gain Remote Access to Systems
06
Feb
2026

Hackers Leveraging Windows Screensaver to Deploy RMM Tools and Gain Remote Access to Systems

Cybersecurity threats are constantly evolving, and a recent campaign highlights a deceptive new tactic where attackers leverage Windows screensaver (.scr)…

CISA Alerts Exploited React Native Community Security Flaw
06
Feb
2026

CISA Alerts Exploited React Native Community Security Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting the React Native Community CLI to its…

End-of-Support Edge Devices Now Pose Federal Cyber Risk
06
Feb
2026

End-of-Support Edge Devices Now Pose Federal Cyber Risk

The growing cyber threat from End-of-Support edge devices is no longer a technical inconvenience, it is a national cybersecurity liability….

06
Feb
2026

Trusted Access For Cyber: OpenAI Expands AI Security

OpenAI has announced a new initiative aimed at strengthening digital defenses while managing the risks that come with capable artificial…

New Epstein Tool Searches LinkedIn Connections Against 3.5 Million Pages Epstein Files
06
Feb
2026

New Epstein Tool Searches LinkedIn Connections Against 3.5 Million Pages Epstein Files

Epstein Tool A new open-source Python tool named EpsteIn enables users to check if their LinkedIn connections appear in over…

CentOS 9 Security Flaw Enables Privilege Escalation
06
Feb
2026

CentOS 9 Security Flaw Enables Privilege Escalation

A critical security flaw has been identified in CentOS 9 that allows a local user to escalate their privileges to…

06
Feb
2026

Mobile privacy audits are getting harder

Mobile apps routinely collect and transmit personal data in ways that are difficult for users, developers, and regulators to verify….

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
06
Feb
2026

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

Ravie LakshmananFeb 06, 2026Artificial Intelligence / Vulnerability Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM),…

CISA Warns of React Native Community Command Injection Vulnerability Exploited in Attacks
06
Feb
2026

CISA Warns of React Native Community Command Injection Vulnerability Exploited in Attacks

React Native Command Injection Flaw The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-11953 to its Known Exploited…