Author: Cybernoz

DragonForce Ransomware Group is Targeting Saudi Arabia
27
Feb
2025

DragonForce Ransomware Group is Targeting Saudi Arabia

DragonForce Ransomware group is targeting Saudi Arabia Pierluigi Paganini February 27, 2025 Resecurity researchers reported that DragonForce ransomware targets Saudi…

27
Feb
2025

Trustmi Behavioral AI combats social engineering attacks

Trustmi announced new Behavioral AI, anomaly detection, and risk-scoring capabilities to help enterprise customers combat social engineering attacks on their…

Cellebrite blocked Serbia from using its solution because misuse of the equipment for political reasons
27
Feb
2025

Cellebrite blocked Serbia from using its solution because misuse of the equipment for political reasons

Cellebrite blocked Serbia from using its solution because misuse of the equipment for political reasons Pierluigi Paganini February 27, 2025…

27
Feb
2025

Siemens Teamcenter vulnerability could allow account takeover (CVE-2025-23363)

A high-severity vulnerability (CVE-2025-23363) in the Siemens Teamcenter product lifecycle management (PLM) software could allow an attacker to steal users’…

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices
27
Feb
2025

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

Feb 27, 2025Ravie LakshmananVulnerability / Network Security A new malware campaign has been observed targeting edge devices from Cisco, ASUS,…

27
Feb
2025

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability affecting its Nexus 3000 and…

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers
27
Feb
2025

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers

Feb 27, 2025Ravie LakshmananCybercrime / Cryptocurrency The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit…

Top vulnerabilities in 2024 and what to watch for in 2025
27
Feb
2025

Top vulnerabilities in 2024 and what to watch for in 2025

The financial services industry continues to be hit hard by malicious actors, with the average cost of a data breach…

New Wi-Fi Jamming Attack Can Disable Specific Devices
27
Feb
2025

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks with surgical precision, raising alarms…

North Korean hackers
27
Feb
2025

FBI confirms Lazarus hackers were behind $1.5B Bybit crypto heist

FBI has confirmed that North Korean hackers stole $1.5 billion from cryptocurrency exchange Bybit on Friday in the largest crypto…

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts
27
Feb
2025

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that could allow attackers to bypass…

27
Feb
2025

Is Agentic AI too smart for your own good?

Agentic AI, which consists of systems that autonomously take action based on high-level goals, is becoming integral to enterprise security,…