Tag: data exfiltration

  • Microsoft Security Blog: Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/05/01/analyzing-cve-2025-31191-a-macos-security-scoped-bookmarks-based-sandbox-escape/ Source: Microsoft Security Blog Title: Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape Feedly Summary: Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run unrestricted on the system. We shared our findings with Apple and a fix was released for this vulnerability,…

  • Slashdot: 4chan Returns, Details Breach, Blames Funding Issues, Ends Shockwave Board

    Source URL: https://tech.slashdot.org/story/25/04/27/0252257/4chan-returns-details-breach-blames-funding-issues-ends-shockwave-board?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: 4chan Returns, Details Breach, Blames Funding Issues, Ends Shockwave Board Feedly Summary: AI Summary and Description: Yes Summary: The text describes a security breach experienced by 4chan due to outdated infrastructure and insufficient resources. A hacker exploited a vulnerability in a script handling PDFs, leading to significant data exfiltration.…

  • CSA: Oracle Cloud Breach: Mitigate Attacks with Agentic AI

    Source URL: https://cloudsecurityalliance.org/articles/oracle-cloud-infrastructure-breach-mitigating-future-attacks-with-agentic-ai Source: CSA Title: Oracle Cloud Breach: Mitigate Attacks with Agentic AI Feedly Summary: AI Summary and Description: Yes Summary: The text outlines a significant security breach within Oracle Cloud Infrastructure (OCI) affecting its Identity Manager systems. It provides insights into the attack’s anatomy, the vulnerabilities exploited, the impact of data exfiltration, and…

  • Microsoft Security Blog: Threat actors misuse Node.js to deliver malware and other malicious payloads

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/04/15/threat-actors-misuse-node-js-to-deliver-malware-and-other-malicious-payloads/ Source: Microsoft Security Blog Title: Threat actors misuse Node.js to deliver malware and other malicious payloads Feedly Summary: Since October 2024, Microsoft Defender Experts has observed and helped multiple customers address campaigns leveraging Node.js to deliver malware and other payloads that ultimately lead to information theft and data exfiltration. The post Threat…