Author: Cybernoz

Malicious MCP Servers Enable Stealthy Prompt Injection to Drain System Resources
09
Dec
2025

Malicious MCP Servers Enable Stealthy Prompt Injection to Drain System Resources

Security researchers have uncovered critical vulnerabilities in the Model Context Protocol (MCP) sampling feature that enable malicious servers to execute…

Interview: Filip Nekvinda on balancing IT stability with digital ambition at Abdul Latif Jameel
09
Dec
2025

Airline set to launch with end-to-end AI workflows

Riyadh Air has collaborated with IBM Consulting to deliver what the pair claim is the world’s first airline that is…

Majority of global firms plan to boost cyber spending in 2026
09
Dec
2025

Majority of global firms plan to boost cyber spending in 2026

Dive Brief: Two-thirds of organizations across the globe are planning to increase their investment in cyber risk prevention over the…

GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment
09
Dec
2025

GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment

The GOLD BLADE threat group has shifted from pure espionage to a hybrid model that combines data theft with targeted…

Burp Suite Upgrades Scanner With Detection for Critical React2Shell Flaws
09
Dec
2025

Burp Suite Upgrades Scanner With Detection for Critical React2Shell Flaws

ActiveScan++, a widely used extension for the popular penetration testing tool Burp Suite, has released a significant upgrade. The scanner…

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure
09
Dec
2025

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

Dec 09, 2025Ravie LakshmananCybersecurity / Malware Four distinct threat activity clusters have been observed leveraging a malware loader known as…

North Korea
09
Dec
2025

North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks

A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence mechanisms and leverages…

Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities
09
Dec
2025

Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities

A new wave of ransomware attacks targeting virtual machine platforms has emerged, with the Akira ransomware group leading a campaign…

AI-Driven Tools Uncover GhostPenguin Backdoor Attacking Linux Servers
09
Dec
2025

AI-Driven Tools Uncover GhostPenguin Backdoor Attacking Linux Servers

A sophisticated Linux backdoor named GhostPenguin has been discovered by Trend Micro Research, evading detection for over four months after…

Are we mistaking regulation for resilience?
09
Dec
2025

Are we mistaking regulation for resilience?

As security leaders in the UK, we often feel squeezed between an increasingly aggressive threat landscape and a sprawling legislative…

Broadside botnet hits TBK DVRs, raising alarms for maritime logistics
09
Dec
2025

Broadside botnet hits TBK DVRs, raising alarms for maritime logistics

Broadside botnet hits TBK DVRs, raising alarms for maritime logistics Pierluigi Paganini December 09, 2025 Mirai-based Broadside botnet targets vulnerable…

Ransomware IAB abuses EDR for stealthy malware execution
09
Dec
2025

Ransomware IAB abuses EDR for stealthy malware execution

An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware,…