SonicWall Confirms Cause of Recent VPN Attacks

SonicWall has announced that recent attacks targeting its firewalls, which protect networks and allow remote work through VPNs, are due to an old security flaw that has already been fixed. These attacks are not caused by a new, unknown vulnerability. The company explained that the attacks are related to a security issue called CVE-2024-40766, which […]

U.S. Nuclear Agency Breached in Microsoft SharePoint Hack

The U.S. National Nuclear Security Administration (NNSA), the agency responsible for maintaining and designing the nation’s nuclear weapons, was among the organizations affected by a recent cyberattack exploiting a vulnerability in Microsoft’s SharePoint document management software. The breach was reported on July 22, 2025, citing anonymous sources familiar with the matter. While the NNSA has […]

CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

On July 22, 2025, the U.S. government issued an urgent warning after discovering that foreign hackers had found a way to break into Microsoft SharePoint, a popular tool used by many businesses and government agencies to share documents and collaborate online. The Cybersecurity and Infrastructure Security Agency (CISA), which helps protect the country from cyberattacks, […]

Global Bust Exposes “BaitTrap” Network of 17,000 Fake News Sites

Cybersecurity experts have uncovered a sprawling scam operation involving more than 17,000 fabricated news websites, operating across some 50 countries. This criminal network—referred to as “BaitTrap”—specializes in luring unsuspecting individuals into investment fraud schemes, cleverly disguised behind the façade of legitimate news outlets like CNN, BBC, and CNBC. The scam begins with professional-looking fake news […]

Hackers Use Malicious PDFs to Impersonate Microsoft, DocuSign & More via “Callback Phishing”

Hackers have stepped up a new phishing method that uses malicious PDF attachments to impersonate well-known companies like Microsoft and DocuSign. These fake PDFs encourage recipients to call phone numbers controlled by the attackers, pretending to be customer support representatives. This technique, called callback phishing or Telephone-Oriented Attack Delivery (TOAD), is becoming increasingly common. During […]

AMD Discloses New CPU Vulnerabilities in Transient Scheduler Attacks

AMD has issued a warning about a newly discovered class of microarchitectural vulnerabilities, dubbed Transient Scheduler Attacks (TSA), that affect a broad range of its processors, including desktop, mobile, and server chips. These flaws arise from speculative scheduling behavior within the CPU, where timing differences during instruction execution can allow attackers to infer sensitive data […]