A hole in Microsoft Office is being exploited by bad actors, including Russian hackers targeting Ukraine's government.
Regtechtimes on MSN
Security researchers uncover APT28 campaign exploiting newly disclosed Microsoft Office flaw
Cybersecurity investigators have identified a new cyberattack campaign connected to the Russia-linked hacking group APT28, ...
APT28 exploited a Microsoft Office flaw to deliver MiniDoor and Covenant Grunt malware in targeted attacks across Ukraine and Eastern Europe.
Rapid7 links China-linked Lotus Blossom to a 2025 Notepad++ hosting breach that delivered the Chrysalis backdoor via hijacked updates, fixed in v8.8.9 ...
Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.
Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says ...
Pam's Colecovision was her babysitter, from the age of 4 or 5, but the family only had one game. Over and over, hour after hour, she'd climb and jump through the three levels of Donkey Kong. But the ...
In hundreds of official complaints, inadvertently posted online by the Russian government, soldiers and their loved ones describe a lawless and violent military apparatus that abuses its own troops to ...
MMO After a server glitch, Final Fantasy 11 is dispatching Game Masters to manually assassinate bugged monsters just so the game knows they're really dead: 'God personally stepping in to correct the ...
WASHINGTON (AP) — China is exploiting partnerships with U.S. researchers funded by the Department of Energy to provide the Chinese military with access to sensitive nuclear technology and other ...
A torrent of proof-of-concept (PoC) exploits for React2Shell has hit the internet following the vulnerability's disclosure last week, and while security researchers say most are fake, ineffective and ...
A single stored procedure transformed into a multi-functional tool like a Swiss Army knife after exploitation — an attack-focused SQL CLR toolset: file system control, payload preparation, privilege ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results