Amelia Coen | 30 April 2025 at 13:23 UTC 1000s of pentesters are currently using Burp AI features to hack…
Ascension, one of the largest private healthcare systems in the United States, is notifying patients that their personal and health…
Security researchers have identified significant connections between two major ransomware-as-a-service (RaaS) operations, with evidence suggesting affiliates from the recently-disabled RansomHub…
The Co-operative Group has confirmed it shut down parts of its IT network after detecting an attempted cyberattack, in what…
Vulnerabilities in Apple’s AirPlay Protocol, AirPlay Software Development Kits (SDKs), and the CarPlay Communication Plug-in could allow attackers to compromise…
Apr 30, 2025Ravie LakshmananMalware / DNS Security A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to…
The Wordfence Threat Intelligence team has identified a new strain of WordPress malware that masquerades as a legitimate plugin, often…
Google enhances cybersecurity with Agentic AI, launching Unified Security to fight zero-day exploits, enterprise threats, and credential-based attacks. Google’s Threat…
Apr 30, 2025The Hacker News How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore….
Mozilla has officially released Firefox 138, marking a significant update focused on user security. The new version addresses multiple high-severity…
China-linked hackers targeted Uyghur activists using a Trojanized UyghurEditPP app in a spear-phishing campaign, Citizen Lab researchers reveal. Citizen Lab…
Emails purportedly sent by rental property management firms are being used to steal money from people in France and Canada,…







![[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats [Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats](https://image.cybernoz.com/wp-content/uploads/2025/04/Free-Webinar-Guide-to-Securing-Your-Entire-Identity-Lifecycle-Against.jpg)


