Author: Cybernoz

Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security
11
Dec
2025

Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security

Critical security updates for Acrobat and Reader are available, addressing multiple vulnerabilities that could allow attackers to execute arbitrary code and bypass…

Cyber Engineering launches at ctrl:cyber with former Shelde founders
11
Dec
2025

Cyber Engineering launches at ctrl:cyber with former Shelde founders

The new capability is delivered by a close-knit group of specialists who were part of the core management and delivery…

HESTA draws APRA's ire over massive tech replatforming project
11
Dec
2025

HESTA draws APRA’s ire over massive tech replatforming project

Industry super fund HESTA has copped additional licence conditions over its handling of an outsourced provider and technology platform transition…

Ada Lovelace: using market forces to professionalise AI assurance
11
Dec
2025

Google DeepMind partners with UK government to deliver AI

The UK government is partnering with Google DeepMind through a non-legally binding memorandum of understanding to use artificial intelligence (AI)…

Cochlear pilots voice-to-text Salesforce integration for lead management
11
Dec
2025

Cochlear pilots voice-to-text Salesforce integration for lead management

Cochlear is integrating conversational voice-to-text functionality into its CRM that could eliminate the need for its “sales road warriors” to…

Attacks pinned to critical React2Shell defect surge, surpass 50 confirmed victims
11
Dec
2025

Attacks pinned to critical React2Shell defect surge, surpass 50 confirmed victims

Security experts have observed a steady increase in malicious activity from a widening pool of attackers seeking to exploit React2Shell,…

Google ads for shared ChatGPT, Grok guides push macOS infostealer malware
11
Dec
2025

Google ads for shared ChatGPT, Grok guides push macOS infostealer malware

A new AMOS infostealer campaign is abusing Google search ads to lure users into Grok and ChatGPT conversations that appear…

Critical vulnerabilities in multiple Fortinet products – FortiCloud SSO Login Authentication Bypass
11
Dec
2025

Critical vulnerabilities in multiple Fortinet products – FortiCloud SSO Login Authentication Bypass

The Australian Cyber Security Centre has issued a technical alert advising business and government organisations to take immediate action following…

Critical FortiWeb flaw under attack, allowing complete compromise
11
Dec
2025

Fortinet fixed two critical authentication-bypass vulnerabilities

Fortinet fixed two critical authentication-bypass vulnerabilities Pierluigi Paganini December 10, 2025 Fortinet patched 18 flaws, including two authentication-bypass bugs affecting…

Robert Rea
11
Dec
2025

As White House moves to send AI chips to China, Trump’s DOJ prosecutes chip smugglers

As the Trump administration considers loosening restrictions on the sale of high-performance computer chips that power modern artificial intelligence systems…

New DroidLock malware locks Android devices and demands a ransom
11
Dec
2025

New DroidLock malware locks Android devices and demands a ransom

A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom and access text messages, call logs, contacts,…

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
11
Dec
2025

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to…