Think Before You Share the Link: SaaS in the Real World

04/04/2023 0 Comments 0 tags

Collaboration sits at the essence of SaaS applications. The word, or some form of it, appears in the top two headlines on Google Workspace’s homepage. It can be found six

Arid Viper Hacking Group Using Upgraded Malware in Middle East Cyber Attacks

04/04/2023 0 Comments 0 tags

The threat actor known as Arid Viper has been observed using refreshed variants of its malware toolkit in its attacks targeting Palestinian entities since September 2022. Symantec, which is tracking the group

Microsoft Tightens OneNote Security by Auto-Blocking 120 Risky File Extensions

04/04/2023 0 Comments 0 tags

Microsoft has announced plans to automatically block embedded files with “dangerous extensions” in OneNote following reports that the note-taking service is being increasingly abused for malware delivery. Up until now, users were

Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack

04/04/2023 0 Comments 0 tags

The adversary behind the supply chain attack targeting 3CX deployed a second-stage implant specifically singling out a small number of cryptocurrency companies. Russian cybersecurity firm Kaspersky, which has been internally tracking the versatile backdoor

Western Digital Hit by Network Security Breach – Critical Services Disrupted!

03/04/2023 0 Comments 0 tags

Data storage devices maker Western Digital on Monday disclosed a “network security incident” that involved unauthorized access to its systems. The breach is said to have occurred on March 26, 2023, enabling

Italian Watchdog Bans OpenAI’s ChatGPT Over Data Protection Concerns

03/04/2023 0 Comments 0 tags

The Italian data protection watchdog, Garante per la Protezione dei Dati Personali (aka Garante), has imposed a temporary ban of OpenAI’s ChatGPT service in the country, citing data protection concerns.

“It’s The Service Accounts, Stupid”: Why Do PAM Deployments Take (almost) Forever To Complete

03/04/2023 0 Comments 0 tags

Privileged Access Management (PAM) solutions are regarded as the common practice to prevent identity threats to administrative accounts. In theory, the PAM concept makes absolute sense: place admin credentials in

Crypto-Stealing OpcJacker Malware Targets Users with Fake VPN Service

03/04/2023 0 Comments 0 tags

A piece of new information-stealing malware called OpcJacker has been spotted in the wild since the second half of 2022 as part of a malvertising campaign. “OpcJacker’s main functions include keylogging, taking

Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps

01/04/2023 0 Comments 0 tags

Microsoft has patched a misconfiguration issue impacting the Azure Active Directory (AAD) identity and access management service that exposed several “high-impact” applications to unauthorized access. “One of these apps is

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation

01/04/2023 0 Comments 0 tags

Critical security flaws in Cacti, Realtek, and IBM Aspera Faspex are being exploited by various threat actors in hacks targeting unpatched systems. This entails the abuse of CVE-2022-46169 (CVSS score: 9.8) and CVE-2021-35394 (CVSS