Topic: targeted sectors

  • US Leads Global List with 396 Hacked SharePoint Systems

    US Leads Global List with 396 Hacked SharePoint Systems

    A critical Microsoft SharePoint vulnerability (CVE-2025-53770/53771) compromised 396 systems globally, with the U.S. accounting for nearly a third of attacks and government agencies being the primary targets. The breach disproportionately affected high-value targets like U.S. government entities,...

    Read More »
  • China-Linked 'Warp Panda' Hacks North American Firms in Espionage Campaign

    China-Linked 'Warp Panda' Hacks North American Firms in Espionage Campaign

    A Chinese state-linked cyber-espionage group, 'Warp Panda,' is targeting North American legal, tech, and manufacturing firms for intelligence aligned with China's strategic priorities. The group demonstrates high sophistication, exploiting vulnerabilities to access VMware vCenter systems and depl...

    Read More »
  • Microsoft Office Patch: Urgent Fix for Russian-State Hackers

    Microsoft Office Patch: Urgent Fix for Russian-State Hackers

    A Russian state-linked hacking group (APT28/Fancy Bear) rapidly exploited a critical Microsoft Office vulnerability (CVE-2026-21509) within two days of its patch, compromising diplomatic, transport, and defense organizations in multiple countries. The campaign was exceptionally stealthy, using en...

    Read More »
  • Ransomware Attacks Surge 13% as Leak Sites Target More Victims

    Ransomware Attacks Surge 13% as Leak Sites Target More Victims

    European organizations experienced a 13% surge in ransomware attacks, with the UK, Germany, Italy, France, and Spain being the most targeted, and the manufacturing sector was the most vulnerable. The majority of incidents involved both file encryption and data theft, with groups like Akira and Lo...

    Read More »
  • Okta SSO accounts targeted in vishing data theft attacks

    Okta SSO accounts targeted in vishing data theft attacks

    A new wave of sophisticated phishing attacks uses real-time voice calls and adversary-in-the-middle platforms to steal employee Okta credentials and bypass multi-factor authentication (MFA) by manipulating victims during live conversations. Attackers conduct detailed reconnaissance, spoof interna...

    Read More »