Tag Microsoft

An App Designed to Dox Critics of Charlie Kirk Ended Up Doxing Its Own Users Instead

Recent findings reveal that the US Department of Homeland Security (DHS) has amassed DNA data from nearly 2,000 American citizens in recent years. This accumulation raises significant concerns regarding legal implications and the level of oversight involved, especially since the collected genetic material has been entered into an FBI crime…

Read MoreAn App Designed to Dox Critics of Charlie Kirk Ended Up Doxing Its Own Users Instead

Microsoft Addresses Actively Exploited Privilege Escalation Vulnerability in Power Pages

Microsoft Addresses Critical Vulnerabilities in Bing and Power Pages Microsoft has issued security updates to resolve two critical vulnerabilities affecting its Bing search engine and Power Pages platform, one of which is currently being actively exploited. The release highlights ongoing concerns in the cybersecurity landscape as attackers increasingly target widely…

Read MoreMicrosoft Addresses Actively Exploited Privilege Escalation Vulnerability in Power Pages

Hackers Concealed Malware Using Complex AI Code

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Attackers Conceal Malware Within Vector Image Rashmi Ramesh (rashmiramesh_) • September 24, 2025 Image: Shutterstock Recent findings indicate that hackers have utilized artificial intelligence-generated code to embed malware in a sophisticated phishing campaign, according to insights from Microsoft. This malware…

Read MoreHackers Concealed Malware Using Complex AI Code

Feds Link ‘Scattered Spider’ Pair to $115 Million in Ransom Payments – Krebs on Security

In a significant legal development, U.S. prosecutors recently filed criminal charges against Thalha Jubair, a 19-year-old from the U.K., in connection with his alleged involvement as a central figure in Scattered Spider, a notorious cybercrime organization implicated in extortion schemes totaling over $115 million. These accusations, which emerged as Jubair…

Read MoreFeds Link ‘Scattered Spider’ Pair to $115 Million in Ransom Payments – Krebs on Security

2,500+ Variants of Truesight.sys Driver Exploited for EDR Bypass and HiddenGh0st RAT Deployment

A significant malware campaign has been uncovered that exploits a vulnerable driver from Adlice’s software suite to circumvent security measures and deploy the Gh0st RAT malware. This revelation underscores the persistent risks that come from legacy systems and their components. The cybersecurity firm Check Point detailed a strategic approach taken…

Read More2,500+ Variants of Truesight.sys Driver Exploited for EDR Bypass and HiddenGh0st RAT Deployment

CERT-UA Alerts of UAC-0173 Attacks Targeting Ukrainian Notaries with DCRat Deployment

The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert concerning a resurgence in cyber activity from the organized criminal group known as UAC-0173. This group is reportedly employing a remote access trojan called DCRat (also referred to as DarkCrystal RAT) to infiltrate systems. This recent campaign, which…

Read MoreCERT-UA Alerts of UAC-0173 Attacks Targeting Ukrainian Notaries with DCRat Deployment

Hackers Leverage Vulnerability in Paragon Partition Manager Driver for Ransomware Attacks

Recent investigations have unveiled that cybercriminals have exploited a critical vulnerability in the BioNTdrv.sys driver of Paragon Partition Manager, leveraging it in ransomware attacks to escalate privileges and execute unauthorized code. This significant zero-day vulnerability, classified as CVE-2025-0289, is part of a broader set of five vulnerabilities identified by Microsoft…

Read MoreHackers Leverage Vulnerability in Paragon Partition Manager Driver for Ransomware Attacks

The Growing Threat of Data Exfiltration: Why It Poses a Bigger Risk Than Ransomware

The cybersecurity landscape has seen a notable shift in recent years, transitioning from ransomware as the primary threat to the rise of data exfiltration as a significant concern for organizations. Initially, attackers exploited vulnerabilities in various systems, reaping the rewards of cryptocurrencies while victims remained unprepared to defend against intrusions.…

Read MoreThe Growing Threat of Data Exfiltration: Why It Poses a Bigger Risk Than Ransomware