Author: Cybernoz

Numerous Applications Using Google's Firebase Platform Leaking Highly Sensitive Data
25
Sep
2025

Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data

Numerous mobile applications have been found to expose critical user information through misconfigured Firebase services, allowing unauthenticated attackers to access…

Malware Deployment via Copyright Takedown Claims by Threat Actors
25
Sep
2025

Malware Deployment via Copyright Takedown Claims by Threat Actors

Threat actors from the Lone None group are exploiting copyright takedown notices to distribute sophisticated malware, including Pure Logs Stealer…

25
Sep
2025

GenAI is exposing sensitive data at scale

Sensitive data is everywhere and growing fast. A new report from Concentric AI highlights how unstructured data, duplicate files, and…

Cisco confirms active exploitation of ISE and ISE-PIC flaws
25
Sep
2025

Cisco fixed actively exploited zero-day in Cisco IOS and IOS XE software

Cisco fixed actively exploited zero-day in Cisco IOS and IOS XE software Pierluigi Paganini September 25, 2025 Cisco addressed a…

New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic
25
Sep
2025

New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic

Organizations commonly allow traffic to core services like Google Meet, YouTube, Chrome update servers, and Google Cloud Platform (GCP) to…

Hackers Deploy Stealthy Malware on WordPress Sites to Gain Admin Access
25
Sep
2025

Hackers Deploy Stealthy Malware on WordPress Sites to Gain Admin Access

Attackers have stepped up their tactics by deploying stealthy backdoors disguised as legitimate WordPress components, ensuring persistent administrative access even…

25
Sep
2025

Secure Code Warrior gives CISOs visibility into developer AI tool usage

Secure Code Warrior has launched a beta program to expand the AI capabilities of its Trust Agent product. The new…

SNMP Vulnerability
25
Sep
2025

Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

Sep 25, 2025Ravie LakshmananVulnerability / Network Security Cisco has warned of a high-severity security flaw in IOS Software and IOS…

Stealthy, persistent
25
Sep
2025

Stealthy, persistent “BRICKSTORM” spying backdoor found in network infrastructure

Google’s Threat Intelligence Group (GTIG) and Mandiant have published an analysis of the BRICKSTORM backdoor espionage malware, which it attributes…

Linux Kernel ksmbd Vulnerability Allows Remote Attackers to Execute Arbitrary Code
25
Sep
2025

Linux Kernel ksmbd Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A severe vulnerability in the Linux kernel’s ksmbd SMB server implementation has been disclosed, potentially allowing authenticated remote attackers to…

Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data
25
Sep
2025

Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data

Security researchers have observed renewed exploit campaigns targeting an eight-year-old backdoor in Hikvision cameras to harvest configuration files, user lists,…

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes
25
Sep
2025

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes

Luxembourg, Luxembourg, September 25th, 2025, CyberNewsWire Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the…