Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents
Security researchers at Fortinet's FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized Microsoft Word documents to deliver information-stealing malware to unsuspecting Windows users.
The attack exploits a well-known vulnerability to deploy...
Marks & Spencer Confirms a Cyberattack Hits Payments & Online Orders
British retail giant Marks & Spencer (M&S) has confirmed it is dealing with a significant cyber incident that has disrupted contactless payment systems and its Click and Collect service, leaving customers frustrated during the...
Lumma Stealer Exploits Fake CAPTCHA Pages to Harvest Sensitive Data
A sophisticated malware campaign is utilizing fake CAPTCHA verification pages to distribute Lumma Stealer, an advanced information-stealing malware that has gained significant traction in underground markets since its 2022 debut.
As of March 2025, this...
RedGolf Hackers Expose Fortinet Exploits & Tools Used to Hack Organizations
RedGolf, a sophisticated threat actor with ties to APT41, provided a rare insight into its operational toolbox after a directory on their attack infrastructure was briefly exposed.
The server, linked to KeyPlug malware activities, inadvertently...
Beware! New Malware Mimics as Cisco Webex Attacks Users in-the-wild
Cybersecurity researchers have uncovered an active malware campaign dubbed "Voldemort" that masquerades as legitimate Cisco Webex components to deploy backdoors on targeted systems.
The discovery comes just days after Cisco released a security advisory...
New Phishing Attack Targeting Job Seekers via WhatsApp Offers
A sophisticated new phishing campaign identified targeting job seekers with fraudulent Meta and WhatsApp employment opportunities.
The attack, which emerges amid a 12% rise in global phishing attempts since 2024, employs advanced social engineering tactics...
Data Poisoning: The Next Evolution of Ransomware That No One is Ready For
For many years, ransomware has been associated with online extortion, causing businesses to become immobilized as they attempt to recover encrypted data.
With cybersecurity teams preparing for these direct attacks, organizations have become accustomed...
Spotting Phishing Attacks with Image Verification Techniques
An interconnected digital landscape differentiates the current era from previous ones, as using the internet for various personal and professional purposes was uncommon then.
While this phenomenon has eased multiple tasks for people of...
CISOs Respond to Surge in AI-Powered Attacks with Advanced Defense Strategies
The cybersecurity landscape is rapidly evolving as artificial intelligence (AI) becomes both a powerful tool for defense and a formidable weapon for attackers.
Cybercriminals are leveraging AI to create more sophisticated, adaptive, and difficult-to-detect...
Sensata Technologies Hacked – Ransomware Attack Disrupts Operations
A sophisticated ransomware attack has struck Sensata Technologies, causing significant operational disruptions across the company's global network.
The industrial technology firm, which develops sensor-rich solutions and electrical protection systems for automotive, aerospace, and industrial applications,...