Microsoft has significantly upgraded its .NET Bounty Program, introducing substantial enhancements that broaden the program’s scope, refine award structures, and offer increased incentives for cybersecurity […]
Month: August 2025
Cybercriminals Exploit Proofpoint and Intermedia Link Wrapping to Conceal Phishing Attacks
In recent months, a surge in credential-phishing campaigns has unveiled a concerning trend: cybercriminals are exploiting the link-wrapping features of reputable email security platforms, notably […]
CISA Releases Critical ICS Advisories for Güralp Seismic Devices and Rockwell VMware Systems
On July 31, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued two significant advisories concerning vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities, found […]
Meta and ZDI Offer $1 Million Bounty for WhatsApp Zero-Click Exploit at Pwn2Own Ireland 2025
In a groundbreaking move, Meta, in collaboration with Trend Micro’s Zero Day Initiative (ZDI), has announced a $1 million bounty for a zero-click remote code […]
APT36’s Evolving Cyber Threats: Weaponized PDFs Targeting Indian Critical Infrastructure
The cyber espionage group APT36, also known as Transparent Tribe, has intensified its operations against India’s critical infrastructure, expanding its focus beyond military targets to […]
Harnessing AI: Accelerating Offensive Cybersecurity Research with Large Language Models
The integration of Large Language Models (LLMs) into cybersecurity research has significantly transformed offensive strategies, particularly in the identification and exploitation of vulnerabilities within Windows […]
Cybercriminals Exploit Microsoft OAuth to Bypass Security Measures
In recent years, cybercriminals have increasingly exploited Microsoft’s OAuth (Open Authorization) framework to gain unauthorized access to user accounts, bypassing traditional security measures such as […]
Microsoft to Disable External Workbook Links to Blocked File Types by Default
In a significant move to bolster security within its Microsoft 365 suite, Microsoft has announced that, starting October 2025, external workbook links to certain blocked […]
Microsoft Teams Introduces 60-Second Silent Test Calls for Proactive Network Monitoring
Microsoft has unveiled a new feature for Teams administrators: 60-second silent test calls designed to proactively assess network quality without disrupting user experiences. This advancement […]
Storm-2603 Exploits SharePoint Vulnerabilities to Deploy Warlock Ransomware
In recent developments, a cyber threat actor identified as Storm-2603 has been actively exploiting critical vulnerabilities in Microsoft SharePoint Server to deploy Warlock ransomware on […]