Category: Cyber Security


  • Microsoft Fixes Classic Outlook Email Delivery Issues

    Microsoft fixes Classic Outlook email delivery issues after users reported failed messages and unexpected errors. The problem disrupted email sending in specific account setups. The update restores normal functionality and removes the need for manual fixes. Email Sending Problems Affect Users Some users experienced issues when sending emails through Classic Outlook. Messages appeared to send…

  • Microsoft Removes Support and Recovery Assistant from Windows

    Microsoft removes Support and Recovery Assistant from Windows as part of its push toward more secure support tools. The company has officially deprecated the utility and no longer includes it in updated systems. This change affects both everyday users and IT teams that relied on it for troubleshooting. SaRA Tool Phased Out Microsoft removes Support…

  • Medusa ransomware affiliate linked to zero-day attacks

    A Medusa ransomware affiliate is now linked to zero-day attacks targeting enterprise systems. Microsoft researchers say the group moves quickly to exploit newly discovered vulnerabilities. The activity highlights how ransomware operations continue to evolve toward faster and more aggressive campaigns. Microsoft connects attacks to Medusa affiliate Microsoft attributes the activity to a threat actor tracked…

  • FortiClient EMS flaw exploited as CISA orders urgent patch

    A critical FortiClient EMS flaw is now under active exploitation, prompting urgent action from US authorities. The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure affected systems within a tight deadline. The move reflects growing concern over how quickly attackers are using the vulnerability. CISA sets strict patching deadline CISA has…

  • QR code phishing scam targets drivers with fake traffic texts

    A new QR code phishing scam is targeting drivers through fake traffic violation texts. Attackers are replacing traditional links with QR codes to make their messages harder to detect. Security researchers warn that this shift increases both reach and effectiveness. QR codes bypass traditional detection Scammers send text messages that claim recipients have unpaid traffic…

  • FortiClient EMS vulnerability exploited in active attacks

    A critical FortiClient EMS vulnerability is now under active exploitation. Attackers are targeting exposed servers to gain unauthorized access to enterprise environments. Security researchers warn that unpatched systems face a high risk of compromise. Vulnerability enables remote command execution The flaw affects Fortinet’s FortiClient Endpoint Management Server. It allows attackers to send crafted requests that…

  • React2Shell attack used in automated credential theft campaign

    The React2Shell attack is now part of an automated credential theft campaign targeting modern web applications. Attackers are exploiting a critical vulnerability to access sensitive data at scale. Security researchers warn that the activity is ongoing and continues to expand. Critical flaw enables remote access The attack uses a vulnerability in React-based environments that allows…

  • Cambodia scam law targets fraud networks with tough penalties

    Cambodia has introduced its first Cambodia scam law to directly target large-scale fraud operations. The move follows growing international pressure to act against scam centers linked to global cybercrime. Authorities aim to disrupt these networks and strengthen enforcement across the country. New law focuses on organized scam operations The legislation creates a clear legal framework…

  • Russia VPN crackdown disrupts payments, Durov warns

    The Russia VPN crackdown is now affecting more than internet access. New disruptions show that financial systems have also started to break down. Telegram CEO Pavel Durov says recent restrictions triggered a payment system failure, raising concerns about how far the impact could spread. Payment disruption exposes system fragility Authorities intensified efforts to block VPN…

  • Axios npm hack used fake Teams fix

    The Axios npm hack started with a fake Microsoft Teams scenario, not a code flaw. Attackers targeted a maintainer directly and used social engineering to gain access. That single compromise allowed them to push malicious updates to a widely used package. The incident shows how supply chain attacks now begin with people, not vulnerabilities. Attackers…