Author: Cybernoz

Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability
08
Dec
2025

Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability

A dedicated command-line tool, fix-react2shell-next, to help developers immediately detect and patch the critical “React2Shell” vulnerability (CVE-2025-66478). This new scanner offers…

Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes
08
Dec
2025

Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes

Cal.com has disclosed a critical authentication bypass vulnerability that could allow attackers to gain unauthorized access to user accounts by…

NVIDIA research shows how agentic AI fails under attack
08
Dec
2025

NVIDIA research shows how agentic AI fails under attack

Enterprises are rushing to deploy agentic systems that plan, use tools, and make decisions with less human guidance than earlier…

Predator Spyware Compamy Used 15 Zero-Days Since 2021 to Target iOS Users
08
Dec
2025

Predator Spyware Compamy Used 15 Zero-Days Since 2021 to Target iOS Users

A commercial spyware company called Intellexa has exploited 15 zero-day vulnerabilities since 2021 to target iOS and Android users worldwide….

Indonesia’s Gambling Industry Reveals Clues of Nationwide Cyber Involvement
08
Dec
2025

Indonesia’s Gambling Industry Reveals Clues of Nationwide Cyber Involvement

A massive Indonesian-speaking cybercrime operation spanning over 14 years has been uncovered, revealing a sophisticated infrastructure that shows hallmarks of…

The Bastion: Open-source access control for complex infrastructure
08
Dec
2025

The Bastion: Open-source access control for complex infrastructure

Operational teams know that access sprawl grows fast. Servers, virtual machines and network gear all need hands-on work and each…

Critical React2Shell RCE Vulnerability Exploitied in the Wild to Execute Malicious Code
08
Dec
2025

Critical React2Shell RCE Vulnerability Exploitied in the Wild to Execute Malicious Code

A critical remote code execution vulnerability, tracked as CVE-2025-55182 and dubbed “React2Shell,” is now under active exploitation in the wild….

Invisible IT is becoming the next workplace priority
08
Dec
2025

Invisible IT is becoming the next workplace priority

IT leaders want their employees to work without running into digital hurdles, but many still struggle with fragmented systems that…

CISOs are spending big and still losing ground
08
Dec
2025

CISOs are spending big and still losing ground

Security leaders are entering another budget cycle with more money to work with, but many still feel no safer. A…

NETREAPER Offensive Security Toolkit That Wraps 70+ Penetration Testing Tools
08
Dec
2025

NETREAPER Offensive Security Toolkit That Wraps 70+ Penetration Testing Tools

A unified offensive security toolkit, NETREAPER, developed by OFFTRACKMEDIA Studios, consolidates over 70 penetration testing tools into a single, user-friendly…

Thoughts on Doctorow's 'Reverse Centaurs' AI Talk
08
Dec
2025

Thoughts on Doctorow’s ‘Reverse Centaurs’ AI Talk

This is another brilliantly written and highly misguided essay by Cory Doctorow. It demonstrates a complete lack of understanding of…

Extortion only attacks surge for Manufacturers
08
Dec
2025

Extortion only attacks surge for Manufacturers

Sophos has released its State of Ransomware in Manufacturing and Production 2025 report, revealing a significant shift in attacker behaviour as manufacturers…