Cybersecurity Jobs in Most Demand in 2025

With the rapid expansion of digital transformation and the increasing sophistication of cyber threats, the demand for skilled cybersecurity professionals continues to rise. Organizations across industries are prioritizing security to protect sensitive data, infrastructure, and operations from cyberattacks. As we…

Microsoft Text Services Framework Exploited for Stealthy Persistence

A novel persistence mechanism exploiting Microsoft’s Text Services Framework (TSF) has been uncovered by researchers at Praetorian Labs, revealing a sophisticated method for maintaining long-term access to compromised systems. While requiring administrative privileges for initial deployment, this technique enables stealthy…

Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit

Cybersecurity researchers have uncovered a novel phishing campaign distributing the notorious Tycoon 2FA phishing kit through fraudulent timesheet notification emails, marking a concerning evolution in multi-layered credential theft operations.  The operation utilizes Pinterest’s visual bookmarking service as an intermediary redirector,…

LibreOffice Vulnerabilities Allow Attackers to Write to Files and Extract Data

Two critical vulnerabilities in LibreOffice (CVE-2024-12425 and CVE-2024-12426) expose millions of users to file system manipulation and sensitive data extraction attacks. These flaws affect both desktop users opening malicious documents and server-side systems using LibreOffice for headless document processing. CVE-2024-12425:…