A newly discovered vulnerability, dubbed “G-Door,” allows malicious actors to circumvent Microsoft 365 security measures by exploiting unmanaged Google Docs accounts. This security flaw poses a significant threat to organizations
All posts by admin
Threat Actors Exploiting Microsoft Office Vulnerability to Execute Malicious Code
A sophisticated cyber-espionage group known as Cloud Atlas has been observed leveraging a critical Microsoft Office vulnerability to launch targeted attacks against organizations in Eastern Europe and Central Asia. According
WPA3 Network Password Bypassed via MITM Attack & Social Engineering
Researchers have successfully bypassed the Wi-Fi Protected Access 3 (WPA3) protocol to obtain network passwords using a combination of Man-in-the-Middle attacks and social engineering techniques. The research, conducted by Kyle
Weekly Cybersecurity Newsletter: Cyber Attack News, Vulnerabilities & Data Breaches
Welcome to this week’s Cyber Security Newsletter, where we explore the latest advancements and important updates in the field of cybersecurity. Your engagement in this swiftly changing digital landscape is
New PaaS Platform “FlowerStorm” Attacking Microsoft 365 Users
A new phishing-as-a-service (PaaS) platform called “FlowerStorm” has emerged, targeting Microsoft 365 users. This platform has quickly gained traction following the unexpected disruption of its predecessor, Rockstar2FA, in November 2024.
Ascension Health Hacked – Ransomware Attack Compromised 5.6 Million Patients Data
Ascension Health, one of the largest health systems in the United States, has reported a significant data security breach that could potentially affect around 5.6 million patient records, including patients
Mastercard Completes Acquisition of Cybersecurity Firm Recorded Future for $2.6 Billion
Mastercard (NYSE: MA) has officially finalized the acquisition of Recorded Future, a leading provider of AI-driven threat intelligence. Mastercard Operating in over 200 countries and territories worldwide, Mastercard is a
Critical PHP Zero-Day Vulnerability in Craft CMS Lets Hackers Gain Remote Access
A significant security vulnerability in Craft CMS, one of the most widely used PHP-based content management systems, has been uncovered, allowing unauthenticated remote code execution (RCE) under default configurations. The
Authorities Arrested LockBit Ransomware Developer & Team Core Member
U.S. authorities have unveiled charges against Rostislav Panev, a dual Russian-Israeli national, for his alleged role as a key developer of the notorious LockBit ransomware group. Panev, 51, was arrested
US Ban on TP-Link Routers More About Politics Than Exploitation Risk
While a number of threat groups have used TP-Link bugs to infiltrate networks, a proposed ban of the company’s popular routers is more about geopolitics than actual cybersecurity — and