Tag: preventative measures
-
Unit 42: Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances
Source URL: https://unit42.paloaltonetworks.com/threat-brief-compromised-salesforce-instances/ Source: Unit 42 Title: Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances Feedly Summary: This Threat Brief discusses observations on a campaign leveraging Salesloft Drift integration to exfiltrate data via compromised OAuth credentials. The post Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances appeared first on Unit 42.…
-
Krebs on Security: Microsoft Fix Targets Attacks on SharePoint Zero-Day
Source URL: https://krebsonsecurity.com/2025/07/microsoft-fix-targets-attacks-on-sharepoint-zero-day/ Source: Krebs on Security Title: Microsoft Fix Targets Attacks on SharePoint Zero-Day Feedly Summary: On Sunday, July 20, Microsoft Corp. issued an emergency security update for a vulnerability in SharePoint Server that is actively being exploited to compromise vulnerable organizations. The patch comes amid reports that malicious hackers have used the Sharepoint…
-
Cloud Blog: How Google Cloud is securing open-source credentials at scale
Source URL: https://cloud.google.com/blog/products/identity-security/securing-open-source-credentials-at-scale/ Source: Cloud Blog Title: How Google Cloud is securing open-source credentials at scale Feedly Summary: Credentials are an essential part of modern software development and deployment, granting bearers privileged access to systems, applications, and data. However, credential-related vulnerabilities remain the predominant entry point exploited by threat actors in the cloud. Stolen credentials…
-
Unit 42: Serverless Tokens in the Cloud: Exploitation and Detections
Source URL: https://unit42.paloaltonetworks.com/serverless-authentication-cloud/ Source: Unit 42 Title: Serverless Tokens in the Cloud: Exploitation and Detections Feedly Summary: Understand the mechanics of serverless authentication: three simulated attacks across major CSPs offer effective approaches for application developers. The post Serverless Tokens in the Cloud: Exploitation and Detections appeared first on Unit 42. AI Summary and Description: Yes…
-
The Register: DragonForce double-whammy: First hit an MSP, then use RMM software to push ransomware
Source URL: https://www.theregister.com/2025/05/28/dragonforce_ransomware_gang_sets_fire/ Source: The Register Title: DragonForce double-whammy: First hit an MSP, then use RMM software to push ransomware Feedly Summary: SimpleHelp was the vector for the attack DragonForce ransomware infected a managed service provider, and its customers, after attackers exploited security flaws in remote monitoring and management tool SimpleHelp.… AI Summary and Description:…
-
The Register: London celebrity talent agency reports itself to ICO following Rhysida attack claims
Source URL: https://www.theregister.com/2025/02/19/london_celebrity_talent_agency_reports/ Source: The Register Title: London celebrity talent agency reports itself to ICO following Rhysida attack claims Feedly Summary: Showbiz members’ passport scans already plastered online A London talent agency has reported itself to the UK’s data protection watchdog after the Rhysida ransomware crew last week claimed it had attacked the business, which…