Tag Microsoft

Researchers Discover Windows Vulnerabilities That Give Hackers Rootkit-Style Access

Recent research reveals that the conversion process from DOS to NT paths in Windows represents a potential exploitation vector for threat actors, enabling rootkit-like functionality that could hide and impersonate files, directories, and processes. According to Or Yair, a security researcher from SafeBreach, when users invoke functions that involve a…

Read MoreResearchers Discover Windows Vulnerabilities That Give Hackers Rootkit-Style Access

US Imposes Sanctions on Russia and Expels 10 Diplomats Due to SolarWinds Cyberattack

On Thursday, the U.S. and U.K. governments officially attributed the supply chain breach of SolarWinds, an IT infrastructure management firm, to Russian government operatives from the Foreign Intelligence Service (SVR). This attribution was made with “high confidence,” acknowledging the complexity and depth of the cyber-attack. The U.K. government issued a…

Read MoreUS Imposes Sanctions on Russia and Expels 10 Diplomats Due to SolarWinds Cyberattack

FireEye Hacked: Red-Team Penetration Testing Tools Compromised

On Tuesday, cybersecurity giant FireEye confirmed it has suffered a significant breach, falling victim to a sophisticated state-sponsored attack that resulted in the theft of its Red Team penetration testing tools. These tools are integral for evaluating the security measures of their clients, spotlighting the pressing vulnerabilities that organizations face,…

Read MoreFireEye Hacked: Red-Team Penetration Testing Tools Compromised

US Agencies and FireEye Compromised via SolarWinds Software Vulnerability

In a significant cybersecurity breach, state-sponsored actors allegedly associated with Russia have targeted prominent U.S. agencies, including the Treasury and the Department of Commerce’s National Telecommunications and Information Administration (NTIA). This sophisticated cyber espionage campaign has involved the monitoring of internal email communications, exposing vulnerabilities in national cybersecurity. Reports from…

Read MoreUS Agencies and FireEye Compromised via SolarWinds Software Vulnerability

Microsoft Confirms Its Systems Were Compromised in Major SolarWinds Hack

A comprehensive state-sponsored espionage operation targeting the software company SolarWinds has also extended to Microsoft, according to recent developments in an ongoing investigation. Initial reports suggest that the attack might be more extensive and sophisticated than earlier assessments indicated. Reuters first disclosed Microsoft’s involvement, noting that malicious actors utilized the…

Read MoreMicrosoft Confirms Its Systems Were Compromised in Major SolarWinds Hack

Russia’s APT28 Utilizes Windows Print Spooler Vulnerability to Deploy ‘GooseEgg’ Malware

A recent cyber threat has emerged, linked to the nation-state group known as APT28, which has exploited a vulnerability in the Microsoft Windows Print Spooler service to distribute a custom malware variant named GooseEgg. This security flaw, tracked as CVE-2022-38028, received a high CVSS score of 7.8 and has been…

Read MoreRussia’s APT28 Utilizes Windows Print Spooler Vulnerability to Deploy ‘GooseEgg’ Malware

Researchers Identify New Infrastructure Deployed by SolarWinds Hackers

The SolarWinds cyberattack, which unfolded last December, has been recognized for its intricate methods of penetrating and maintaining a presence within targeted systems. Microsoft has characterized the involved threat actors as “skillful and methodic operators” committed to employing operational security best practices to evade detection. Recent research has uncovered evidence…

Read MoreResearchers Identify New Infrastructure Deployed by SolarWinds Hackers

Hackers Utilize VPN Vulnerabilities to Install SUPERNOVA Malware on SolarWinds Orion

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently unveiled details about a sophisticated advanced persistent threat (APT) that has been exploiting the Supernova backdoor to infiltrate SolarWinds Orion installations. The breach was traced back to access gained through a connection to a compromised Pulse Secure VPN device. CISA reported…

Read MoreHackers Utilize VPN Vulnerabilities to Install SUPERNOVA Malware on SolarWinds Orion

Are We Entering the Quantum Decade?

Encryption & Key Management, Next-Generation Technologies & Secure Development, Security Operations Rising Enterprise Applications and International Initiatives Propel Us Into a Quantum Future Brian Pereira (creed_digital) • November 14, 2025 Image: Shutterstock In 2025, quantum computing has risen to prominence, particularly due to the surge in discussions surrounding post-quantum cryptography.…

Read MoreAre We Entering the Quantum Decade?