Tag Microsoft

Microsoft Alerts on APT28, Backed by Kremlin, Exploiting Major Outlook Vulnerability

Microsoft recently announced the detection of nation-state activities tied to the Kremlin, exploiting a critical security vulnerability in the Outlook email service that has since been patched. This issue allowed unauthorized access to user accounts hosted on Microsoft Exchange servers, raising alarming security concerns for organizations relying on this platform.…

Read MoreMicrosoft Alerts on APT28, Backed by Kremlin, Exploiting Major Outlook Vulnerability

Undetected for Five Years: The Asia-Pacific Cyber Espionage Campaign

Recent investigations have revealed that a sophisticated group of Chinese hackers, known as ‘Naikon APT,’ has been executing a prolonged cyber espionage campaign targeting various governmental entities across Australia, Indonesia, the Philippines, Vietnam, Thailand, Myanmar, and Brunei. This campaign, which has remained undetected for a minimum of five years, continues…

Read MoreUndetected for Five Years: The Asia-Pacific Cyber Espionage Campaign

15,000 GitHub Go Module Repositories at Risk of Repojacking Attacks

GitHub Vulnerability Exposes Over 15,000 Go Repositories to Repojacking Attacks Recent research has unveiled that more than 15,000 Go module repositories on GitHub are at risk of repojacking attacks, a significant cybersecurity concern. Jacob Baines, Chief Technology Officer at VulnCheck, reported that over 9,000 of these vulnerabilities stem from changes…

Read More15,000 GitHub Go Module Repositories at Risk of Repojacking Attacks

New Bluetooth Vulnerability Could Allow Hackers to Control Android, Linux, macOS, and iOS Devices

A significant security vulnerability affecting Bluetooth technology poses risks to Android, Linux, macOS, and iOS devices. Identified as CVE-2023-45866, this flaw allows malicious actors to bypass authentication procedures, enabling unauthorized access to susceptible devices and the capability to execute commands remotely. According to security researcher Marc Newlin, who disclosed these…

Read MoreNew Bluetooth Vulnerability Could Allow Hackers to Control Android, Linux, macOS, and iOS Devices

Can We Trust AI Agents in Healthcare? Exploring Identity in the Age of AI Webinar.

Scott MacDonald: Leader in Cybersecurity and Risk Management at PwC Principal, Cyber, Risk and Regulatory Scott MacDonald serves as a Principal in PwC’s Cybersecurity practice, boasting two decades of expertise in large-scale Identity and Access Management (IAM) initiatives, particularly within the healthcare sector. His career has been marked by the…

Read MoreCan We Trust AI Agents in Healthcare? Exploring Identity in the Age of AI Webinar.

New Security Flaws Discovered in pfSense Firewall Software – Update Immediately

Recent findings have uncovered multiple security vulnerabilities within the open-source Netgate pfSense firewall solution. These vulnerabilities could potentially be combined by an attacker, allowing them to execute arbitrary commands on affected devices. The identified issues involve two reflected cross-site scripting (XSS) issues alongside a command injection vulnerability, as reported by…

Read MoreNew Security Flaws Discovered in pfSense Firewall Software – Update Immediately

Caution: Experts Uncover Fresh Insights on Zero-Click Outlook RCE Vulnerabilities

Recent findings have revealed two security vulnerabilities in Microsoft Windows that have since been patched but could have been exploited by attackers to carry out remote code execution (RCE) on Outlook email clients without any user intervention. This information was disclosed by Akamai researcher Ben Barnea, who discovered the flaws…

Read MoreCaution: Experts Uncover Fresh Insights on Zero-Click Outlook RCE Vulnerabilities

Europe’s AI Challenge Goes Beyond Regulation

Artificial Intelligence & Machine Learning, General Data Protection Regulation (GDPR), Next-Generation Technologies & Secure Development Europe’s Challenges Extend Beyond Regulatory Revisions Pam Baker • December 19, 2025 Image: Shutterstock A key assumption driving a proposed overhaul of European technology regulations is the belief that excessive bureaucracy hinders the region’s progress…

Read MoreEurope’s AI Challenge Goes Beyond Regulation