Author: Cybernoz

Coordinated Cyberattacks Seek to Cripple Critical Infrastructure
27
Oct
2025

Coordinated Cyberattacks Seek to Cripple Critical Infrastructure

A sophisticated cyber-sabotage group known as Predatory Sparrow has emerged as one of the most destructive threat actors targeting Iranian…

Qilin Ransomware
27
Oct
2025

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack

The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every…

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack
27
Oct
2025

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack

HashiCorp has disclosed two critical vulnerabilities in its Vault software that could allow attackers to bypass authentication controls and launch…

Australian scaleup to bring AI-led data protection to the MoD
27
Oct
2025

Building trustworthy technology: How AI and data can improve government

The rise of artificial intelligence (AI) has been met with both excitement and anxiety – a blend of optimism about…

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover
27
Oct
2025

Wordfence blocks 8.7M attacks exploiting old GutenKit and Hunk Companion flaws

Wordfence blocks 8.7M attacks exploiting old GutenKit and Hunk Companion flaws Pierluigi Paganini October 27, 2025 Hackers exploited old RCE…

Microsoft Faces Federal Court Action Over Alleged Misleading Conduct in Microsoft 365 Subscription Communications
27
Oct
2025

Microsoft Faces Federal Court Action Over Alleged Misleading Conduct in Microsoft 365 Subscription Communications

The Australian Competition and Consumer Commission (ACCC) has initiated proceedings in the Federal Court against Microsoft Australia Pty Ltd and…

Discord
27
Oct
2025

Hackers steal Discord accounts with RedTiger-based infostealer

Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and payment information….

Hackers Exploiting Microsoft WSUS Vulnerability In The Wild
27
Oct
2025

Hackers Exploiting Microsoft WSUS Vulnerability In The Wild

Hackers are actively exploiting a critical flaw in Microsoft’s Windows Server Update Services (WSUS), with security researchers reporting widespread attempts…

Chatbots Are Pushing Sanctioned Russian Propaganda
27
Oct
2025

Chatbots Are Pushing Sanctioned Russian Propaganda

OpenAI’s ChatGPT, Google’s Gemini, DeepSeek, and xAI’s Grok are pushing Russian state propaganda from sanctioned entities—including citations from Russian state…

North Korean Chollima Actors Added BeaverTail and OtterCookie to its Arsenal
27
Oct
2025

North Korean Chollima Actors Added BeaverTail and OtterCookie to its Arsenal

Famous Chollima, a DPRK-aligned threat group, has evolved its arsenal, with BeaverTail and OtterCookie increasingly merging functionalities to steal credentials…

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands
27
Oct
2025

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands

The newly released OpenAI Atlas web browser has been found to be susceptible to a prompt injection attack where its…

Windows 10: Microsoft Extended Support Upgrade programme explained
27
Oct
2025

Windows 10: Microsoft Extended Support Upgrade programme explained

Windows 10 Extended Security Updates (ESU) is a paid subscription that provides security patches now that mainstream support of Windows…