Author: Cybernoz

Scammers harvesting Facebook photos to stage fake kidnappings, warns FBI
08
Dec
2025

Scammers harvesting Facebook photos to stage fake kidnappings, warns FBI

The FBI has warned about a new type of scam where your Facebook pictures are harvested to act as “proof-of-life”…

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
08
Dec
2025

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?

Dec 08, 2025The Hacker News The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run…

LOLPROX Exposes Hidden Exploitation Paths that Can Enable Stealthy Hypervisor Attacks
08
Dec
2025

LOLPROX Exposes Hidden Exploitation Paths that Can Enable Stealthy Hypervisor Attacks

Proxmox Virtual Environment has become a popular choice for organizations building private cloud infrastructure and virtual machine management systems. However,…

CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation
08
Dec
2025

CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a high-severity vulnerability affecting Meta’s React Server Components to its…

A Year of Smarter, Context-Aware API Security — API Security
08
Dec
2025

A Year of Smarter, Context-Aware API Security — API Security

As the year draws to a close, it’s worth pausing to look back on what has been an extraordinary year…

Hackers Compromising Developers with Malicious VS Code, Cursor AI Extensions
08
Dec
2025

Hackers Compromising Developers with Malicious VS Code, Cursor AI Extensions

The developer tools used by millions of programmers worldwide have become a prime target for attackers seeking to compromise entire…

LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks
08
Dec
2025

LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks

A new security analysis has unveiled “LOLPROX,” a comprehensive catalog of “Living Off The Land” (LOL) techniques specifically targeting Proxmox…

Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes
08
Dec
2025

Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes

Critical security alerts have been issued for Firebox firewall devices due to serious ten vulnerabilities. The vulnerabilities in WatchGuard, disclosed…

Over 70 Domains Used in Months-Long Phishing Spree Against US Universities
08
Dec
2025

Over 70 Domains Used in Months-Long Phishing Spree Against US Universities

A new report from security firm Infoblox reveals that at least 18 American universities have been hit by a prolonged,…

Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
08
Dec
2025

Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features

Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded version of…

Barts Health Data Breach Confirmed As Cl0p Attack
08
Dec
2025

Barts Health Data Breach Confirmed As Cl0p Attack

Barts Health NHS Trust has confirmed that the data breach at Barts Health was carried out by the Russian-speaking Cl0p…

OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks
08
Dec
2025

OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks

The OceanLotus hacker group, widely tracked as APT32, has initiated a highly targeted surveillance campaign aimed at China’s “Xinchuang” IT…