Tag: unauthorized access
-
Microsoft Security Blog: Investigating targeted “payroll pirate” attacks affecting US universities
Source URL: https://www.microsoft.com/en-us/security/blog/2025/10/09/investigating-targeted-payroll-pirate-attacks-affecting-us-universities/ Source: Microsoft Security Blog Title: Investigating targeted “payroll pirate” attacks affecting US universities Feedly Summary: Microsoft Threat Intelligence has identified a financially motivated threat actor that we track as Storm-2657 compromising employee accounts to gain unauthorized access to employee profiles and divert salary payments to attacker-controlled accounts, attacks that have been dubbed…
-
Slashdot: Salesforce Says It Won’t Pay Extortion Demand in 1 Billion Records Breach
Source URL: https://yro.slashdot.org/story/25/10/08/208202/salesforce-says-it-wont-pay-extortion-demand-in-1-billion-records-breach?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Salesforce Says It Won’t Pay Extortion Demand in 1 Billion Records Breach Feedly Summary: AI Summary and Description: Yes Summary: Salesforce is facing an extortion demand from a crime syndicate that claims to have stolen approximately 1 billion records from various customers, highlighting vulnerabilities in user compliance and security…
-
Krebs on Security: ShinyHunters Wage Broad Corporate Extortion Spree
Source URL: https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/ Source: Krebs on Security Title: ShinyHunters Wage Broad Corporate Extortion Spree Feedly Summary: A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they…
-
The Register: Employees regularly paste company secrets into ChatGPT
Source URL: https://www.theregister.com/2025/10/07/gen_ai_shadow_it_secrets/ Source: The Register Title: Employees regularly paste company secrets into ChatGPT Feedly Summary: Microsoft Copilot, not so much Employees could be opening up to OpenAI in ways that put sensitive data at risk. According to a study by security biz LayerX, a large number of corporate users paste Personally Identifiable Information (PII)…
-
The Register: Red Hat fesses up to GitLab breach after attackers brag of data theft
Source URL: https://www.theregister.com/2025/10/03/red_hat_gitlab_breach/ Source: The Register Title: Red Hat fesses up to GitLab breach after attackers brag of data theft Feedly Summary: Open source giant admits intruders broke into dedicated consulting instance, but insists core products untouched What started as cyber crew bragging has now been confirmed by Red Hat: someone gained access to its…
-
The Register: ‘Delightful’ root-access bug in Red Hat OpenShift AI allows full cluster takeover
Source URL: https://www.theregister.com/2025/10/01/critical_red_hat_openshift_ai_bug/ Source: The Register Title: ‘Delightful’ root-access bug in Red Hat OpenShift AI allows full cluster takeover Feedly Summary: Who wouldn’t want root access on cluster master nodes? A 9.9 out of 10 severity bug in Red Hat’s OpenShift AI service could allow a remote attacker with minimal authentication to steal data, disrupt…
-
The Register: US Air Force investigates ‘privacy-related issue’ amid rumored SharePoint shutdown
Source URL: https://www.theregister.com/2025/10/01/us_air_force_investigates_breach/ Source: The Register Title: US Air Force investigates ‘privacy-related issue’ amid rumored SharePoint shutdown Feedly Summary: Uncle Sam can’t quit Redmond Exclusive The US Air Force confirmed it’s investigating a “privacy-related issue" amid reports of a Microsoft SharePoint-related breach and subsequent service-wide shutdown, rendering mission files and other critical tools potentially unavailable…
-
The Register: Warnings about Cisco vulns under active exploit are falling on deaf ears
Source URL: https://www.theregister.com/2025/09/30/cisco_firewall_vulns/ Source: The Register Title: Warnings about Cisco vulns under active exploit are falling on deaf ears Feedly Summary: 50,000 firewall devices still exposed Nearly 50,000 Cisco ASA/FTD instances vulnerable to two bugs that are actively being exploited by “advanced" attackers remain exposed to the internet, according to Shadowserver data.… AI Summary and…
-
Cloud Blog: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations/ Source: Cloud Blog Title: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations Feedly Summary: Written by: Omar ElAhdan, Matthew McWhirt, Michael Rudden, Aswad Robinson, Bhavesh Dhake, Laith Al Background Protecting software-as-a-service (SaaS) platforms and applications requires a comprehensive security strategy. Drawing…
-
Slashdot: Escalation in Akira Campaign Targeting SonicWall VPNs, Deploying Ransomware, With Malicious Logins
Source URL: https://it.slashdot.org/story/25/09/27/2055246/escalation-in-akira-campaign-targeting-sonicwall-vpns-deploying-ransomware-with-malicious-logins?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Escalation in Akira Campaign Targeting SonicWall VPNs, Deploying Ransomware, With Malicious Logins Feedly Summary: AI Summary and Description: Yes Summary: This text discusses a recent security incident involving the exploitation of a vulnerability in SonicWall SSL VPNs, leading to rapid ransomware deployment. The analysis highlights the critical need for…