Cybercriminals are Using Microsoft Office Documents to Spread Malware in Business Environments
Microsoft Office provides tools for creating professional reports, college essays, CVs, and notes on Office 365. It offers text and data editing features, including macros and Python scripting in Excel, [...]
Foxit PDF Reader and Editor Flaw Enables Privilege Escalation
A new privilege escalation vulnerability (CVE-2024-29072, severity 8.2 High) has been discovered in multiple versions of Foxit PDF Reader for Windows. Foxit has fixed the issue and published a security [...]
New Embargo Ransomware Discovered, Potential ALPHV Rebirth
A new ransomware strain called Embargo, written in Rust, has surfaced with its Darknet infrastructure. Using double extortion tactics, it resembles the recently seized ALPHV group. The novice gang already [...]
TP-Link Archer C5400X Router Flaw Allows Remote Hacking
Hackers frequently target routers, the gateways connecting devices and networks to the internet, because they are often neglected for security updates. Cybersecurity researchers at OneKey recently discovered a flaw in [...]
Hackers Can Exploit Apple’s Wi-Fi Positioning System to Track Users Globally
A recent study by University of Maryland security researchers revealed a major privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS). This flaw allows hackers to globally track Wi-Fi access points [...]