Okta Discloses Broader Impact Linked to October 2023 Support System Breach

29/11/2023 0 Comments 0 tags

Identity services provider Okta has disclosed that it detected “additional threat actor activity” in connection with the October 2023 breach of its support case management system. “The threat actor downloaded the names

Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability

29/11/2023 0 Comments 0 tags

Google has rolled out security updates to fix seven security issues in its Chrome browser, including a zero-day that has come under active exploitation in the wild. Tracked as CVE-2023-6345, the

GoTitan Botnet Spotted Exploiting Recent Apache ActiveMQ Vulnerability

29/11/2023 0 Comments 0 tags

The recently disclosed critical security flaw impacting Apache ActiveMQ is being actively exploited by threat actors to distribute a new Go-based botnet called GoTitan as well as a .NET program known as PrCtrl

DJVU Ransomware’s Latest Variant ‘Xaro’ Disguised as Cracked Software

29/11/2023 0 Comments 0 tags

A variant of a ransomware strain known as DJVU has been observed to be distributed in the form of cracked software. “While this attack pattern is not new, incidents involving

Transform Your Data Security Posture – Learn from SoFi’s DSPM Success

29/11/2023 0 Comments 0 tags

As cloud technology evolves, so does the challenge of securing sensitive data. In a world where data duplication and sprawl are common, organizations face increased risks of non-compliance and unauthorized

Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access

29/11/2023 0 Comments 0 tags

Cybersecurity researchers have detailed a “severe design flaw” in Google Workspace’s domain-wide delegation (DWD) feature that could be exploited by threat actors to facilitate privilege escalation and obtain unauthorized access

How to Handle Retail SaaS Security on Cyber Monday

28/11/2023 0 Comments 0 tags

If forecasters are right, over the course of today, consumers will spend $13.7 billion. Just about every click, sale, and engagement will be captured by a CRM platform. Inventory applications will

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

28/11/2023 0 Comments 0 tags

A new study has demonstrated that it’s possible for passive network attackers to obtain private RSA host keys from a vulnerable SSH server by observing when naturally occurring computational faults

U.S., U.K., and Global Partners Release Secure AI System Development Guidelines

28/11/2023 0 Comments 0 tags

The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for the development of secure artificial intelligence (AI) systems. “The approach prioritizes ownership of

How Hackers Phish for Your Users’ Credentials and Sell Them

28/11/2023 0 Comments 0 tags

Account credentials, a popular initial access vector, have become a valuable commodity in cybercrime. As a result, a single set of stolen credentials can put your organization’s entire network at