Cybersecurity

Category Added in a WPeMatico Campaign

Cybersecurity

Design Flaw in Google Workspace Could Let Attackers Gain Unauthorized Access

Nov 28, 2023NewsroomData Security / Data Breach Cybersecurity researchers have detailed a “severe design flaw” in Google Workspace’s domain-wide delegation (DWD) feature that could be exploited by threat actors to facilitate privilege escalation and obtain unauthorized access to Workspace APIs without super admin privileges. “Such exploitation could result in theft of emails from Gmail, data […]

Cybersecurity

Key Cybercriminals Behind Notorious Ransomware Families Arrested in Ukraine

Nov 28, 2023NewsroomRansomware / Cybercrime A coordinated law enforcement operation has led to the arrest of key individuals in Ukraine who are alleged to be a part of several ransomware schemes. “On 21 November, 30 properties were searched in the regions of Kyiv, Cherkasy, Rivne, and Vinnytsia, resulting in the arrest of the 32-year-old ringleader,” […]

Cybersecurity

Stop Identity Attacks: Discover the Key to Early Threat Detection

Nov 28, 2023The Hacker NewsThreat Detection / Insider Threat Identity and Access Management (IAM) systems are a staple to ensure only authorized individuals or entities have access to specific resources in order to protect sensitive information and secure business assets. But did you know that today over 80% of attacks now involve identity, compromised credentials […]

Cybersecurity

Hackers Can Exploit ‘Forced Authentication’ to Steal Windows NTLM Tokens

Nov 28, 2023NewsroomCyber Attack / Vulnerability Cybersecurity researchers have discovered a case of “forced authentication” that could be exploited to leak a Windows user’s NT LAN Manager (NTLM) tokens by tricking a victim into opening a specially crafted Microsoft Access file. The attack takes advantage of a legitimate feature in the database management system solution […]

Cybersecurity

What a failed attack against ColdFusion revealed about ransomware tools and tactics

A recent attack levied against servers running out-of-date Adobe software sheds some light on how threat actors are currently trying to exploit systems and deploy ransomware. In this recent attack, which took place in September and early October, the threat actors hoped to gain access to Windows servers and, subsequently, deploy ransomware payloads. While the […]