Author: Cybernoz
Security researchers have uncovered critical vulnerabilities in the Model Context Protocol (MCP) sampling feature that enable malicious servers to execute…
Riyadh Air has collaborated with IBM Consulting to deliver what the pair claim is the world’s first airline that is…
Dive Brief: Two-thirds of organizations across the globe are planning to increase their investment in cyber risk prevention over the…
The GOLD BLADE threat group has shifted from pure espionage to a hybrid model that combines data theft with targeted…
ActiveScan++, a widely used extension for the popular penetration testing tool Burp Suite, has released a significant upgrade. The scanner…
Dec 09, 2025Ravie LakshmananCybersecurity / Malware Four distinct threat activity clusters have been observed leveraging a malware loader known as…
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence mechanisms and leverages…
A new wave of ransomware attacks targeting virtual machine platforms has emerged, with the Akira ransomware group leading a campaign…
A sophisticated Linux backdoor named GhostPenguin has been discovered by Trend Micro Research, evading detection for over four months after…
As security leaders in the UK, we often feel squeezed between an increasingly aggressive threat landscape and a sprawling legislative…
Broadside botnet hits TBK DVRs, raising alarms for maritime logistics Pierluigi Paganini December 09, 2025 Mirai-based Broadside botnet targets vulnerable…
An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware,…
