Evidence suggests an attacker gained access to the company’s cloud infrastructure environment, but Oracle insists that didn’t happen.
Автор: Jai Vijayan, Contributing Writer
Cybersecurity Gaps Leave Doors Wide Open
Attackers don’t always need to resort to sophisticated gambits to break and enter; organizations often make it easy for them to walk right in.
Critical ‘IngressNightmare’ Vulns Imperil Kubernetes Environments
More than 40% of all Internet-facing container orchestration clusters are at risk.
Critical Fortinet Vulnerability Draws Fresh Attention
CISA this week added CVE-2025-24472 to its catalog of known exploited vulnerabilities, citing ransomware activity targeting the authentication bypass flaw.
Microsoft Sounds Warning on Multifunctional ‘StilachiRAT’
The sneaky malware packs capabilities for system reconnaissance as well as credential and cryptocurrency theft.
OAuth Attacks Target Microsoft 365, GitHub
In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites.
Apple Drops Another WebKit Zero-Day Bug
A threat actor leveraged the vulnerability in an "extremely sophisticated" attack on targeted iOS users, the company says.
Whopping Number of Microsoft Zero-Days Under Attack
The number of zero-day vulnerabilities getting patched in Microsoft’s March update is the company’s second-largest ever.
‘SideWinder’ Intensifies Attacks on Maritime Sector
The likely India-based threat group is also targeting logistics companies in a continued expansion of its activities.
China’s Silk Typhoon APT Shifts to IT Supply Chain Attacks
The nation-state threat group has been breaching providers of remote management tools, identity management providers, and other IT companies to access networks of targeted entities, according to Microsoft.