Hackers Weaponizing Microsoft Office Doc to Deploy Malware
Microsoft Office allows one to generate a professional business report on office365 or write college essays, prepare CVs, take notes, and perform analysis. These offer…
Microsoft Office allows one to generate a professional business report on office365 or write college essays, prepare CVs, take notes, and perform analysis. These offer…
Microsoft has identified a new North Korean threat actor, now tracked as Moonstone Sleet (formerly Storm-1789). This actor uses a combination of many tried-and-true techniques…
Foxit PDF reader has been discovered with a new privilege escalation vulnerability that allows a low-privileged user to escalate their privileges. This vulnerability has been…
Seattle Public Library (SPL) experienced a ransomware attack that significantly disrupted its technology systems. This incident occurred just one day before the Library had planned…
The United States has imposed sanctions on a cybercrime network responsible for operating a massive residential proxy botnet service to combat cybercrime. This network, 911.re,…
A critical security vulnerability has been identified in the Citrix Workspace app for Mac, potentially allowing attackers to elevate their privileges from a local authenticated…
A Russian citizen has been indicted for working as an “access broker” and selling unauthorized access to computer networks, including a victim company in New…
A proof-of-concept (PoC) exploit has been released for a critical vulnerability in Fortinet’s FortiSIEM. The vulnerability, CVE-2024-23108, allows for remote, unauthenticated command execution as root.…
A critical vulnerability was found in the Replicate AI platform that could have exposed the private AI models and application data of all its customers.…
Hackers often target routers as the gateways that connect devices and networks to the internet. Besides this, they are lucrative targets for threat actors since…
Managed service providers (MSPs) are on the front lines of soaring demand for cybersecurity services as cyberattacks increase in volume and sophistication. Cynet has emerged…
A stalkerware company with poor security practices is exposing victims’ data as the software, designed for unauthorized device monitoring, leaked victims’ phone screenshots through a…