A ransomware group exploited a vulnerability found in a software product used for file transfers, breaching sensitive data repositories and compromising confidential information.
Hackers successfully tricked university employees into transferring a substantial amount of money to a fraudulent bank account under the guise of a legitimate contractor.