{"id":6540,"date":"2025-11-10T15:55:20","date_gmt":"2025-11-10T14:55:20","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=6540"},"modified":"2026-04-07T13:42:06","modified_gmt":"2026-04-07T11:42:06","slug":"reporty","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/reporty\/","title":{"rendered":"Reports (in Slovak language)"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"6540\" class=\"elementor elementor-6540\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0760f2a elementor-widget elementor-widget-spacer\" data-id=\"0760f2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">News from the world of <br>cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9eda6f0 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"9eda6f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Discover the most important information from the world of cybersecurity. Clear reports and analyses will help you navigate the rapidly changing digital environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a7d988 elementor-widget elementor-widget-spacer\" data-id=\"8a7d988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a6a678 elementor-hidden-desktop elementor-hidden-laptop e-flex e-con-boxed e-con e-parent\" data-id=\"5a6a678\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1d7a9ca e-flex e-con-boxed e-con e-child\" data-id=\"1d7a9ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a544eac elementor-widget elementor-widget-spacer\" data-id=\"a544eac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec78ff0 elementor-widget elementor-widget-heading\" data-id=\"ec78ff0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">News from the world of\ncybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daa4f50 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"daa4f50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Discover the most important information from the world of cybersecurity. Clear reports and analyses will help you navigate the rapidly changing digital environment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a67e15b elementor-widget elementor-widget-spacer\" data-id=\"a67e15b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43323be e-flex e-con-boxed e-con e-parent\" data-id=\"43323be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf25196 elementor-widget elementor-widget-heading\" data-id=\"cf25196\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Reports (in Slovak language)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c10d82 elementor-widget elementor-widget-eael-feature-list\" data-id=\"6c10d82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n\t\t\t<ul id=\"eael-feature-list-6c10d82\" class=\"eael-feature-list-items circle stacked  eael-feature-list-vertical\" data-layout-tablet=\"vertical\" data-layout-mobile=\"vertical\">\n\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-d96ac99\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-0\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/Report-31.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/Report-31.pdf\">23.02.2026 - 08.03.2026<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Google confirms Android exploit of CVE-2026-21385 vulnerability in Qualcomm chips. Deepfakes and injection attacks disrupt identity verification systems. Hackers exploit OAuth error redirects to spread malware. Wikipedia hit by self-replicating JavaScript worm campaign. Chrome bug allowed malicious extensions to gain elevated privileges via Gemini panel. <\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-e6ae804\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-1\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/02\/Report-30.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/02\/Report-30.pdf\">09.02.2026 - 22.02.2026<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Attackers exploit fake Google Forms to steal login credentials. Research shows Copilot and Grok can inadvertently expose internal codes and secrets. Cyberattacks on Polish energy hit wind and solar infrastructure. WordPress plugin with 900,000 installations contains critical RCE vulnerability. Study reveals 25% of websites disclose passwords during \"account recovery\".<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-55043ae\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-2\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/02\/Report-29.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/02\/Report-29.pdf\">26.01.2026 - 8.02.2026<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Compromised Notepad++ updates exploited to spread malicious code. The double-edged sword of non-human identities. Semantic Chaining: New jailbreak technique threatens LLM model security. State-sponsored \u201cShadow Campaigns\u201d targeted governments in 155 countries. GlassWorm campaign exploits compromised OpenVSX extensions to attack macOS developers.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-39c4fa7\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-3\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/02\/Report-28.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/02\/Report-28.pdf\">12.01.2026 - 25.01.2026<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Massive data breach of 149 million logins including Gmail and Facebook. Microsoft Teams to bring External Domains Anomalies Report to detect suspicious communication. Azure private endpoint deployments expose Azure resources to DoS attack. Microsoft Teams prepares automatic sharing of work location over Wi-Fi. Cloud malware VoidLink shows clear signs of AI generation.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-952005f\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-4\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/01\/Report-27.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/01\/Report-27.pdf\">30.12.2025 - 08.01.2026<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">OpenAI confirms that ChatGPT will not use health data to train models. Critical RCE vulnerability (CVSS 10.0) threatens the n8n platform and hundreds of thousands of instances. Prompt injection exploits the \u201cMemory\u201d feature in ChatGPT to fraudulently respond. Zoom Stealer: malicious browser extensions collect data from corporate video calls. Google hires \u201cAI quality\u201d engineers after increase in hallucinations in Search AI. <\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-48a2055\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-5\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/01\/Report-26.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/01\/Report-26.pdf\">25.11.2025 - 27.11.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">CISA warns of active attacks on users of popular chat apps. Microsoft Teams: Cross-tenant vulnerability allows bypass of Defender protections via guest access. Microsoft tightens Entra ID security: blocking script injection at login from 2026. Cyberattacks on influencers: growing risk for accounts and followers. New Android malware Sturnus threatens encrypted messages and bank accounts.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-8af8ac7\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-6\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-25.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-25.pdf\">05.11.2025 - 12.11.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">GlassWorm returns and deals with VS Code extensions. Microsoft fixes 63 security flaws, including active zero-day in Windows kernel. Multiple vulnerabilities in ChatGPT allow massive data leaks. GootLoader uses new trick with special fonts to infect WordPress sites. WhatsApp screen-sharing scam.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-d179bc1\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-7\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-22.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-22.pdf\">11.08.2025 - 24.08.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Phishing with AI prompt injection. Docker Desktop SSRF Vulnerability (CVE-2025-9074). Anatsa (TeaBot) banking trojan launched global campaigns. Azure vulnerability allowed access to third-party accounts and services. Firefox 142 fixes critical vulnerabilities allowing remote code execution.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-5cf6c64\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-8\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-21.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-21.pdf\">28.07.2025 - 10.08.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">AgentFlayer: Zero-click data exfiltration from ChatGPT Connectors. CVE-2025-38236: Privilege Escalation via MSG_OOB in Linux kernel. CVE-2025-53786: Privilege Escalation in Microsoft Exchange Hybrid. DarkCloud Stealer \u2013 Fileless Variant with specialized data collection. Mustang Panda attacks Windows users using ToneShell malware that mimics Google Chrome.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-dbd6a69\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-9\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-20.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-20.pdf\">14.07.2025 - 27.07.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Detection of privilege escalation via ADCS (ESC1) using Microsoft Sentinel. Soco404: Cryptominer hidden in 404 error pages. ToolShell: an unlimited feast for attackers. The first known LLM-enabled malware from APT28 hackers integrates AI capabilities into the attack methodology. CISA warns of a 0-Day login authentication vulnerability in Google Chromium browser exploited in attacks.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-a33ca82\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-10\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-19.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-19.pdf\">30.06.2025 - 13.07.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Critical RCE vulnerability in mcp-remote threatens LLM tools. Microsoft removes elevated privileges in Microsoft 365 as part of security reform. MacOS infostealers: New wave of attacks on Apple devices. Critical flaw in Linux kernel allows local privilege escalation. Windows BitLocker bypass vulnerability allows attackers to bypass security feature.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-80932a5\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-11\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-18.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-18.pdf\"> 16.06.2025 - 29.06.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Global malware campaign exploits NFC payments for financial fraud. Advanced APT campaign exploits ClickOnce to target energy sector. New malware uses prompt injection to manipulate AI models during sample processing. Hackers use TeamFiltration penetration framework to gain access to Microsoft Teams, OneDrive, Outlook, and more accounts. Advanced .NET exploit for hidden malware.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-47351da\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-12\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-17.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-17.pdf\"> 01.06.2025 - 14.06.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Web3 developers face waves of attacks via open source packages. CVE-2025-33053: Critical RCE vulnerability in WebDAV exploited by APT groups. BrowserVenom malware exploits popularity of DeepSeek-R1 to infect Windows users. Outlook adds double-click for encrypted emails to prevent unwanted viewing of sensitive data. Critical flaw in OpenPGP.js allows forgery of digital signatures.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-e923b5e\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-13\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-16.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-16.pdf\">18.05.2025 - 31.05.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Critical flaw in OneDrive File Picker allows apps to access entire storage. Chrome 137 brings AI fraud protection and fixes critical vulnerabilities. GhostSpy: New advanced Android malware allows complete device takeover. SharpSuccessor exploits BadSuccessor flaw in Windows Server 2025 to escalate privileges to domain admin level. .Net Chihuahua Infostealer exploits Google Drive to steal browser and crypto wallet credentials.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-7fef93c\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-14\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-15.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-15.pdf\"> 05.05.2025 - 18.05.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Sophisticated NPM Attack uses Google Calendar C2 for sophisticated communication. EU court rules that tracking ads violate GDPR. New vulnerability affects all Intel processors from\nthe last 6 years. Hackers disguised remote access malware as a Microsoft Edge service.\n Bitpixie: Critical BitLocker vulnerability allows encryption to be bypassed in less than 5 minutes. <\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-64357a9\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-15\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-14.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-14.pdf\"> 21.04.2025 - 02.05.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">NodeJS backdoor infects users via CAPTCHA verifications. Phishing-as-a-service tools bypass multifactor authentication using adversary-in-the-middle attacks. Attack exploits Google OAuth vulnerability and bypasses Gmail security checks. GPT-4 created a working exploit for a critical SSH vulnerability in Erlang\/OTP before PoC was published. Malware campaign targets Docker and evades detection with multi-layered obfuscation.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-e735c05\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-16\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report13.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report13.pdf\"> 31.03.2025 - 13.04.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Beware of fake mParivahan app that attacks mobile users via WhatsApp to steal sensitive data. Google introduces A2A protocol that allows AI agents to collaborate and automate work processes. Vulnerability in Windows Kerberos allowed attackers to bypass security feature and gain access to credentials. Vulnerability in Windows Active Directory Domain Services allowed attackers to elevate privileges. Microsoft strengthens Outlook email ecosystem to protect inbox.\n <\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-d1a6e41\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-17\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-12.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-12.pdf\"> 17.03.2025 - 21.03.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">SANS Institute warns of new cloud-based attacks exploiting APIs. Vulnerability in ChatGPT threatens organizations, attackers actively exploit it. GitHub Actions attack likely triggered supply chain attack. Operation FishMedley: New cyberespionage campaign targeting diplomacy and research. Medusa ransomware uses malicious AbyssWorker driver to bypass security.\n<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-55e3b09\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-18\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-11.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-11.pdf\"> 04.03.2025 - 14.03.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Microsoft patches 57 security vulnerabilities, including two zero-days. New legislative pressures threaten encryption. Undocumented commands in ESP32 Bluetooth chip could compromise a billion devices. Ballista botnet exploits vulnerability in 2023 TP-Link routers. Google releases March security update for Android, fixes two actively exploited vulnerabilities.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-e76cc9c\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-19\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-10.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-10.pdf\">24.02.2025 - 28.02.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Google Cloud KMS adds quantum-safe digital signatures. Lazarus Group steals $1.5 billion in cryptocurrencies. Google enables ad targeting for sensitive users. Firefox continues to support Manifest V2, while Chrome bans ad-blockers. Have I Been Pwned adds 284 million accounts compromised by malware.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-a037cba\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-20\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-09.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-09.pdf\"> 18.02.2025 - 22.02.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Apple removes end-to-end iCloud encryption in the UK. Fake Mac updates. Microsoft tests fix for Windows 11 flaw that breaks SSH connections. OpenAI deletes accounts abusing ChatGPT for tracking and influence. Google Chrome disables uBlock Origin for some users as part of Manifest V3 transition.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-15af037\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-21\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-08.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-08.pdf\"> 10.02.2025 - 16.02.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Google fixes bug exposing YouTube users' email addresses. Apple fixes zero-day vulnerability exploited in 'extremely sophisticated' attacks. Hackers exploit CAPTCHA trick on Webflow CDN PDF files to bypass security scanners. Google Chrome introduces AI-powered security feature. Russian hackers exploit 'device code phishing' to take over accounts.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-c71a3e6\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-22\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-07.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-07.pdf\"> 27.01.2025 - 07.02.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">DeepSeek faces coordinated DDoS attacks. Microsoft patches critical vulnerabilities in Azure AI Face Service and Microsoft Account. Ransomware payments to drop 35% in 2024. DeepSeek popularity exploited to spread malicious packages via PyPI. Exploited vulnerabilities to increase in 2024.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-151bfc5\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-23\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-06.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-06.pdf\"> 20.01.2025 - 26.01.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Trump ends DHS advisory board membership, undermining cybersecurity oversight. Hundreds of fake Reddit pages contain Lumma Stealer malware. Insecure tunneling protocols expose 4.2 million hosts, including VPNs and routers. Record-breaking DDoS attack reaches 5.6 Tbps. Supply chain attack targets Chrome extensions.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-d5525f2\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-24\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-04.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-04.pdf\"> 14.01.2025 - 17.01.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Google OAuth vulnerability puts millions of users at risk via abandoned domains. Data leak from Fortinet devices. Attackers exploit Google ads to steal Google Ads accounts. Critical flaws in Planet WGS-804HPT switches allow remote attacks. Vulnerability in macOS allows installation of rootkits.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-c6e9361\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-25\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-03.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-03.pdf\"> 07.01.2025 - 09.01.2025<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Neglected domains exploited in malspam campaigns to bypass security measures. Top 5 malware threats to prepare for in 2025. Banshee 2.0: Malware exploiting Apple encryption on macOS. CISA warns of critical vulnerabilities in Oracle WebLogic Server and Mitel MiCollab. Gravy Analytics Hack exposes hidden location data collection through popular apps.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-45a4579\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-26\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-02.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-02.pdf\"> 01.11.2024 - 06.11.2024<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">New phishing campaign targets Windows systems using malicious Linux VMs. Zero-Click Flaw exposes millions of popular storage devices to potential attack. A man arrested in Canada is believed to be behind the Snowflake customer breach. Malware campaign uses Ethereum smart contracts to control Typosquat npm packages. Google Cloud will enforce multi-factor authentication for all users by 2025.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-24a6ef4\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<a class=\"eael-feature-list-icon fl-icon-27\"href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-01.pdf\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\"><a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/11\/Report-01.pdf\"> 15.10.2024 - 30.10.2024<\/a><\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Microsoft: Schools grapple with thousands of cyberattacks every week (US). Google warns that uBlock Origin and other extensions may soon be disabled. FBI creates fake cryptocurrency to expose widespread cryptocurrency manipulation. American Water shuts down systems after cyberattack. Researchers uncover Hijack Loader malware using stolen code-signing certificates.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Novinky zo sveta kyberbezpe\u010dnosti Objavte najd\u00f4le\u017eitej\u0161ie inform\u00e1cie zo sveta kyberbezpe\u010dnosti. Preh\u013eadn\u00e9 reporty a anal\u00fdzy v\u00e1m pom\u00f4\u017eu zorientova\u0165 sa v r\u00fdchlo sa meniacom digit\u00e1lnom prostred\u00ed. Novinky zo sveta kyberbezpe\u010dnosti Objavte najd\u00f4le\u017eitej\u0161ie inform\u00e1cie zo sveta kyberbezpe\u010dnosti. Preh\u013eadn\u00e9 reporty a anal\u00fdzy v\u00e1m pom\u00f4\u017eu zorientova\u0165 sa v r\u00fdchlo sa meniacom digit\u00e1lnom prostred\u00ed. Reporty 23.02.2026 &#8211; 08.03.2026 Google potvrdzuje zneu\u017e\u00edvanie [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-6540","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/6540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=6540"}],"version-history":[{"count":190,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/6540\/revisions"}],"predecessor-version":[{"id":9350,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/6540\/revisions\/9350"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=6540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}