Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert!

27/03/2025 0 Comments 0 tags

Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these tricks are far from outdated. From phishing schemes to zero-click exploits, malicious Office

New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It

27/03/2025 0 Comments 0 tags

Whether it’s CRMs, project management tools, payment processors, or lead management tools – your workforce is using SaaS applications by the pound. Organizations often rely on traditional CASB solutions for

NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems

27/03/2025 0 Comments 0 tags

A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprise-focused software that’s used to manage data protection across

CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices

27/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old security flaws impacting Sitecore CMS and Experience Platform (XP) to its Known Exploited Vulnerabilities (KEV) catalog, based on

150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms

27/03/2025 0 Comments 0 tags

An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling platforms has ballooned to compromise approximately 150,000 sites to date. “The threat actor has slightly

How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More

26/03/2025 0 Comments 0 tags

When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging breaches stem from within organizations. Whether through negligence or malicious

Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

26/03/2025 0 Comments 0 tags

“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center

Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks

26/03/2025 0 Comments 0 tags

Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another locally installed package, underscoring the continued evolution of software supply chain attacks targeting

RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

26/03/2025 0 Comments 0 tags

The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor’s tradecraft. The activity, observed by Romanian

EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware

26/03/2025 0 Comments 0 tags

The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including backdoors and information stealers