A SaaS Security Challenge: Getting Permissions All in One Place 

08/05/2024 0 Comments 0 tags

Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which data sets. The terminology differs between apps, but each

China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion

07/05/2024 0 Comments 0 tags

The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence of the intrusion now dates back to December 31, 2023. The attack, which came to

APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data

07/05/2024 0 Comments 0 tags

The Iranian state-backed hacking outfit called APT42 is making use of enhanced social engineering schemes to infiltrate target networks and cloud environments. Targets of the attack include Western and Middle Eastern NGOs, media organizations, academia,

Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator

07/05/2024 0 Comments 0 tags

The U.K. National Crime Agency (NCA) has unmasked the administrator and developer of the LockBit ransomware operation, revealing it to be a 31-year-old Russian national named Dmitry Yuryevich Khoroshev. In addition,

New Case Study: The Malicious Comment

07/05/2024 0 Comments 0 tags

How safe is your comments section? Discover how a seemingly innocent ‘thank you’ comment on a product page concealed a malicious vulnerability, underscoring the necessity of robust security measures. Read

Russian Operator of BTC-e Crypto Exchange Pleads Guilty to Money Laundering

07/05/2024 0 Comments 0 tags

A Russian operator of a now-dismantled BTC-e cryptocurrency exchange has pleaded guilty to money laundering charges from 2011 to 2017. Alexander Vinnik, 44, was charged in January 2017 and taken into custody

Google Simplifies 2-Factor Authentication Setup (It’s More Important Than Ever)

07/05/2024 0 Comments 0 tags

Google on Monday announced that it’s simplifying the process of enabling two-factor authentication (2FA) for users with personal and Workspace accounts. Also called, 2-Step Verification (2SV), it aims to add an extra

China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices

06/05/2024 0 Comments 0 tags

The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may have been the work of China-linked actors, according to new findings from attack surface management firm Censys.

Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution

06/05/2024 0 Comments 0 tags

More than 50% of the 90,310 hosts have been found exposing a Tinyproxy service on the internet that’s vulnerable to a critical unpatched security flaw in the HTTP/HTTPS proxy tool. The issue,

New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs

06/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that’s designed to set up persistence on the infected hosts and act as a spyware. Dubbed Cuckoo by Kandji, the