Microsoft is investigating an Exchange Online bug causing anti-spam systems to mistakenly quarantine some users’ emails. […] Go to Source Author: Sergiu Gatlan
Category Archives: Security
The U.S. Department of Treasury announced today that it has removed sanctions against the Tornado Cash cryptocurrency mixer, which North Korean Lazarus hackers used to launder hundreds of millions stolen in multiple crypto heists. […] Go to Source Author: Sergiu Gatlan
Valve has removed a game titled ‘Sniper: Phantom’s Resolution’ from the Steam store following multiple user reports that indicated its demo installer actually infected their systems with information stealing malware. […] Go to Source Author: Bill Toulas
Veeam has patched a critical remote code execution vulnerability tracked as CVE-2025-23120 in its Backup & Replication software that impacts domain-joined installations. […] Go to Source Author: Lawrence Abrams
CISA has warned U.S. federal agencies to secure their networks against attacks exploiting a high-severity vulnerability in NAKIVO’s Backup & Replication software. […] Go to Source Author: Sergiu Gatlan
Two malicious VSCode Marketplace extensions were found deploying in-development ransomware from a remote server, exposing critical gaps in Microsoft’s review process. […] Go to Source Author: Bill Toulas
Attackers have started targeting Cisco Smart Licensing Utility (CSLU) instances unpatched against a vulnerability exposing a built-in backdoor admin account. […] Go to Source Author: Sergiu Gatlan
Security researchers have linked a new backdoor dubbed Betruger, deployed in several recent ransomware attacks, to an affiliate of the RansomHub operation. […] Go to Source Author: Sergiu Gatlan
The UK’s National Cyber Security Centre (NCSC) has published specific timelines on migrating to post-quantum cryptography (PQC), dictating that critical organizations should complete migration by 2035. […] Go to Source Author: Bill Toulas
Popular WordPress security plugin WP Ghost is vulnerable to a critical severity flaw that could allow unauthenticated attackers to remotely execute code and hijack servers. […] Go to Source Author: Bill Toulas
