Accelerating Digital Innovation in Water Utilities: Intertec Systems at Oman Water Week 2025

Accelerating Digital Innovation in Water Utilities: Intertec Systems at Oman Water Week 2025 Top banking leaders in the UAE convened to exchange insights on AI, payment modernization, and strategies driving innovation and resilience in the BFSI sector. Dubai, UAE, April 24, 2025, 15:09 GMT Intertec Systems presents its unified digital water management strategy—blending AI, IoT, […]

Surge in GPS Spoofing Threatens Aviation Safety in Middle East

Surge in GPS Spoofing Threatens Aviation Safety in Middle East GPS spoofing a cyber technique once confined to academic research and niche military applications has rapidly evolved into a widespread and dangerous threat. In 2024 alone, aviation operators reported hundreds of spoofing incidents, particularly across the Middle East and Southeast Asia. By manipulating satellite-based positioning […]

Digital Crumbs: Exploiting Entra ID’s Session Cookies to Breach Microsoft 365

Digital Crumbs: Exploiting Entra ID’s Session Cookies to Breach Microsoft 365 In a recent wave of sophisticated cyberattacks, security researchers uncovered a stealthy campaign dubbed “Cookie Bite,” which targets Microsoft Entra ID (formerly Azure Active Directory) to compromise Microsoft 365 accounts. The attackers abuse OAuth and session tokens to bypass multi-factor authentication (MFA) protections and […]

Critical Remote Code Execution Vulnerability in Cisco Webex App

Critical Remote Code Execution Vulnerability in Cisco Webex App Cisco has disclosed a critical vulnerability tracked as CVE-2025-20236, affecting its popular Webex video conferencing platform. This flaw allows attackers to execute code remotely on a user’s machine. All they need to do is trick someone into clicking a specially crafted meeting link. The vulnerability lies […]

Android Phones Preloaded with Trojanized WhatsApp Target User Crypto Wallets

Android Phones Preloaded with Trojanized WhatsApp Target User Crypto Wallets Cheap Android smartphones mainly from Chinese manufacturers have been found preloaded with trojanized versions of WhatsApp and Telegram. These malicious apps contain clipper malware that targets cryptocurrency users by intercepting clipboard data and swapping wallet addresses. The malware also steals mnemonic phrases from images, hijacks […]

Waiting Thread Hijacking Malware Technique Bypasses Modern Defenses

Waiting Thread Hijacking Malware Technique Bypasses Modern Defenses Security researchers have uncovered a sophisticated new malware technique called Waiting Thread Hijacking (WTH). This stealthy method is an advanced form of classic Thread Execution Hijacking, designed to evade detection by Endpoint Detection and Response (EDR) systems and antivirus solutions. WTH manipulates waiting threads in Windows Thread […]

Beware Fake PDF Converters: Malware Stealing Passwords

Beware Fake PDF Converters: Malware Stealing Passwords A highly targeted malware campaign is exploiting users’ trust in online file conversion services by mimicking the legitimate platform pdfcandy.com. The attack utilizes fake PDF-to-DOCX converters designed to deceive victims into running a malicious PowerShell script, which installs Arechclient2, a variant of the SectopRAT infostealer. This malware is […]

Vulnerabilities in CrushFTP Could Allow Internal Scanning and SMB File Access

Vulnerabilities in CrushFTP Could Allow Internal Scanning and SMB File Access CrushFTP versions 9.x, 10.x up to 10.8.4, and 11.x up to 11.3.1 are affected by two critical vulnerabilities: CVE-2025-32102 (Server-Side Request Forgery) and CVE-2025-32103 (Directory Traversal). The SSRF flaw stems from improper validation of telnetSocket requests, allowing arbitrary port scanning. The Directory Traversal issue […]

Beware of Malicious Campaigns with HR and Target Employee Trust

Beware of Malicious Campaigns with HR and Target Employee Trust Cybercriminals are taking advantage of Q1 performance evaluations by sending HR-themed phishing emails that impersonate “Human Capital” departments. These deceptive messages create a false sense of urgency and authority, prompting employees to click on malicious links leading to a JotForm survey and a fake Microsoft […]