Microsoft 365 Admin Center Disruption Affects North American Users
Microsoft 365 administrators across North America are experiencing significant access issues with the Microsoft 365 admin center, creating operational challenges for organizations that depend on the platform for daily management [...]
Malicious 7-Zip Files Converting PCs into Proxy Nodes
Cybercriminals are running a sneaky operation that uses a fake version of the popular 7-Zip archiving tool to compromise everyday home computers. Instead of just installing file compression software, victims [...]
FortiOS Authentication Flaw Enables LDAP Bypass
A new security advisory from Fortinet highlights a serious weakness in FortiOS that could let attackers slip past authentication controls in certain environments. The issue, tracked as CVE-2026-22153, affects how [...]
Claude Desktop Security Bug Opens Door to RCE
Security researchers at LayerX uncovered a design-level weakness affecting Claude Desktop Extensions (DXT), the extension framework tied to Anthropic’s assistant. The flaw enables a zero-click remote code execution (RCE) scenario, [...]
Using Windows Minifilters to Identify Ransomware Activity
A security researcher has published a proof-of-concept tool on GitHub aimed at stopping ransomware from inside the operating system itself. The project is part of a wider Endpoint Detection and [...]