Invisible authentication mechanisms in Microsoft allow any attacker to escalate from privileged to super-duper privileged in cloud environments, paving the way for complete takeover.
Автор: Nate Nelson, Contributing Writer
Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited
Everyone expected some kind of cyberattack during the Olympics. If this is the best they’ve got, the bad guys don’t deserve a spot on the podium.
20K Ubiquiti IoT Cameras & Routers Are Sitting Ducks for Hackers
In the cloud, patches disseminate automatically. On your computer, you get notified. IoT devices, meanwhile, can escape attention for years on end.
Fortune 50 Co. Pays Record-Breaking $75M Ransomware Demand
The runaway success of an upstart ransomware outfit called "Dark Angels" may well influence the cyberattack landscape for years to come.
Disney, Nike, IBM Signatures Anchor 3M Fake Emails a Day
A simple toggle in Proofpoint’s email service allowed for brand impersonation at an industrial scale. It prompts the question: Are secure email gateways (SEGs) secure enough?
More Legal Records Stolen in 2023 Than Previous 5 Years Combined
Law firms make the perfect target for extortion, so it’s no wonder that ransomware attackers target them and demand multimillion dollar ransoms.
Australian Companies Will Soon Need to Report Ransom Payments
Significant upcoming legislation promises to tighten the screws on cyber incident response in Australia, mirroring CIRCIA in the US.
Ransomware Gangs Exploit ESXi Bug for Instant, Mass Encryption of VMs
With sufficient privileges in Active Directory, attackers only have to create an "ESX Admins" group in the targeted domain and add a user to it.
Targeted PyPi Package Steals Google Cloud Credentials from macOS Devs
The campaign is laser-targeted, bucking the trend of "spray-and-pray" malicious open source packages turning up in code repositories seemingly every other day.
CrowdStrike ‘Updates’ Deliver Malware & More as Attacks Snowball
Phishing and fraud surges during any national news story. This time though, the activity is both more voluminous and more targeted.