Tag Microsoft

Researchers Identify New Infrastructure Deployed by SolarWinds Hackers

The SolarWinds cyberattack, which unfolded last December, has been recognized for its intricate methods of penetrating and maintaining a presence within targeted systems. Microsoft has characterized the involved threat actors as “skillful and methodic operators” committed to employing operational security best practices to evade detection. Recent research has uncovered evidence…

Read MoreResearchers Identify New Infrastructure Deployed by SolarWinds Hackers

Hackers Utilize VPN Vulnerabilities to Install SUPERNOVA Malware on SolarWinds Orion

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently unveiled details about a sophisticated advanced persistent threat (APT) that has been exploiting the Supernova backdoor to infiltrate SolarWinds Orion installations. The breach was traced back to access gained through a connection to a compromised Pulse Secure VPN device. CISA reported…

Read MoreHackers Utilize VPN Vulnerabilities to Install SUPERNOVA Malware on SolarWinds Orion

Are We Entering the Quantum Decade?

Encryption & Key Management, Next-Generation Technologies & Secure Development, Security Operations Rising Enterprise Applications and International Initiatives Propel Us Into a Quantum Future Brian Pereira (creed_digital) • November 14, 2025 Image: Shutterstock In 2025, quantum computing has risen to prominence, particularly due to the surge in discussions surrounding post-quantum cryptography.…

Read MoreAre We Entering the Quantum Decade?

Covert Rootkit Breaches Networks of Prominent Organizations

A sophisticated threat actor has been exploiting an evasive Windows rootkit to infiltrate high-profile organizations in Asia and Africa, with activity detected since at least 2018. This malware, dubbed ‘Moriya’, operates as a passive backdoor, allowing attackers to monitor incoming traffic on infected systems and selectively respond to packets intended…

Read MoreCovert Rootkit Breaches Networks of Prominent Organizations

Experts Uncover the Tactics of the ShinyHunters Cybercrime Group

The cybercrime group known as ShinyHunters has made headlines for its ongoing campaign of data breaches and is now reported to be actively exploiting vulnerabilities in companies’ GitHub repositories. This analysis highlights the group’s strategies for conducting broader and more sophisticated cyberattacks. According to a report from Intel 471 shared…

Read MoreExperts Uncover the Tactics of the ShinyHunters Cybercrime Group

Major Vulnerability in Cosmos Database Impacted Thousands of Microsoft Azure Users

Wiz, a cloud security organization, has disclosed a recently patched vulnerability in Microsoft’s Azure Cosmos database that posed a significant risk by allowing unauthorized users to gain full administrative access to the database instances of other customers. This vulnerability, named “ChaosDB,” was particularly alarming due to its potential for exploitation…

Read MoreMajor Vulnerability in Cosmos Database Impacted Thousands of Microsoft Azure Users

ClickFix: The Unseen Security Risk Your Family Needs to Know About

Phishing Campaigns Targeting Booking.com Users Raise Security Concerns Recent reports highlight a sophisticated phishing campaign aimed primarily at Windows users, as detailed by cybersecurity experts. The attackers exploit compromised accounts from hotels listed on Booking.com or similar online travel services. By leveraging the sensitive information available in these accounts, they…

Read MoreClickFix: The Unseen Security Risk Your Family Needs to Know About

Microsoft Issues Warning About Data-Stealing Malware Masquerading as Ransomware

On Thursday, Microsoft issued a significant warning regarding an extensive email campaign distributing the Java-based STRRAT malware, which disguises itself as ransomware while stealing sensitive information from compromised systems. According to the Microsoft Security Intelligence team, this Remote Access Trojan (RAT) is notorious for mimicking ransomware by adding the file…

Read MoreMicrosoft Issues Warning About Data-Stealing Malware Masquerading as Ransomware

Cisco Alerts Users to Critical Vulnerabilities in Widely Used Open-Weight AI Models

Key Insights: Cisco researchers identified significant security vulnerabilities in several popular open-weight AI models. Multi-turn adversarial attacks were found to be substantially more effective than single interactions. These findings highlight critical concerns regarding AI safety, data privacy, and the integrity of AI models. Cisco has uncovered critical security vulnerabilities in…

Read MoreCisco Alerts Users to Critical Vulnerabilities in Widely Used Open-Weight AI Models