A threat actor has been abusing link wrapping services from reputed technology companies to mask malicious links leading to Microsoft 365 phishing pages that collect login credentials. […] Go to Source Author: Ionut Ilascu
Category Archives: Security
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf. […] Go to Source Author: Sergiu Gatlan
Pi-hole, a popular network-level ad-blocker, has disclosed that donor names and email addresses were exposed through a security vulnerability in the GiveWP WordPress donation plugin. […] Go to Source Author: Sergiu Gatlan
The biggest security threats aren’t always the ones banging on the front door. A recently uncovered flaw shows that hackers can abuse a Microsoft 365 feature to send malicious emails that appear to originate from inside your company. Because they look like internal mail, they often bypass traditional security filters, making them particularly dangerous. The […]
We all know to be careful of suspicious emails from strangers. But what happens when a scam email looks like it was sent by your own colleague? A newly discovered scam allows hackers to become imposters within your organization’s email system, making it harder than ever to tell what’s real and what’s a trap. The […]
Many people are getting better at spotting phishing attacks from outside sources. But what if the attack appears to come from within your own company? A recently discovered vulnerability in Microsoft 365 is being used to bypass traditional security, making it easier than ever for hackers to send you convincing fake emails that slip past […]
A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. […] Go to Source Author: Ionut Ilascu
The Zero Day Initiative is offering a $1 million reward to security researchers who will demonstrate a zero-click WhatsApp exploit at its upcoming Pwn2Own Ireland 2025 hacking contest. […] Go to Source Author: Sergiu Gatlan
Cybersecurity professionals and researchers can now launch Kali Linux in a virtualized container on macOS Sequoia using Apple’s new containerization framework. […] Go to Source Author: Lawrence Abrams
Microsoft has announced that it will start disabling external workbook links to blocked file types by default between October 2025 and July 2026. […] Go to Source Author: Sergiu Gatlan



