Posts in EN

Latest Comments

No comments to show.
ShadowPad Malware Delivered via Exploited WSUS Servers

ShadowPad Malware Delivered via Exploited WSUS Servers A newly patched critical flaw in Microsoft Windows Server Update Services (WSUS) is now being actively exploited to deploy the powerful ShadowPad[…]

CrowdStrike Confirms Insider Misconduct

CrowdStrike Confirms Insider Misconduct American cybersecurity giant CrowdStrike has confirmed that a malicious insider secretly shared screenshots of internal systems with threat actors — including members of ShinyHunters, Scattered[…]

Cloudflare Outage: What Actually Happened

Cloudflare Outage: What Actually Happened On 18 November 2025, Cloudflare experienced one of its most disruptive outages since 2019, causing millions of websites to show 5xx errors and making[…]

Massive Global Phishing Campaign Targets Hotel Guests — 4,300+ Fake Domains Registered

Massive Global Phishing Campaign Targets Hotel Guests — 4,300+ Fake Domains Registered Cybersecurity researchers warn of an ongoing and highly sophisticated phishing campaign run by a Russian-speaking threat actor[…]

The End of Windows 10 Support — What It Means and How to Stay Secure

The End of Windows 10 Support — What It Means and How to Stay Secure A major change is here for millions of Windows users:As of October 14, 2025,[…]

Website Security Hardening

Website Security Hardening We have created a comprehensive step-by-step guide to harden the website infrastructure, eliminate all identified attack pathways, and deploy multiple layers of defense. 1️⃣ Front-end traffic forced through[…]

Microsoft’s November Patch Tuesday Fixes 63 Security Flaws — Including One Active Zero-Day

Microsoft’s November Patch Tuesday Fixes 63 Security Flaws — Including One Active Zero-Day Microsoft released its November 2025 Patch Tuesday, and although the number of fixes (63 CVEs) is[…]

Post SMTP WordPress Plug-in Exploited in Active Attacks — Update Immediately

Post SMTP WordPress Plug-in Exploited in Active Attacks — Update Immediately Threat actors are now exploiting a critical remote attack vulnerability in the popular Post SMTP WordPress plug-in, used[…]

Microsoft Teams Flaws Allowed Message Manipulation and Caller Spoofing

Microsoft Teams Flaws Allowed Message Manipulation and Caller Spoofing Security researchers have revealed four vulnerabilities in Microsoft Teams that could have allowed attackers to impersonate colleagues, modify messages, and[…]

SleepyDuck Malware Hidden in Open VSX Extension Targets Solidity Developers

SleepyDuck Malware Hidden in Open VSX Extension Targets Solidity Developers Researchers have uncovered a malicious Visual Studio Code extension that secretly installs a remote access trojan (RAT) dubbed SleepyDuck,[…]

1 4 5 6 7 8 14