Emerging Attacker Exploit: Microsoft Cross-Tenant Synchronization
Aug 10, 2023The Hacker NewsThreat Detection / Attack Signal Attackers continue to target Microsoft identities to gain access to connected...
Read more →Aug 10, 2023The Hacker NewsThreat Detection / Attack Signal Attackers continue to target Microsoft identities to gain access to connected...
Read more →Adaptive Shield announced its Identity Threat Detection and Response (ITDR) capabilities to help organizations mitigate identity-related threats. When paired with...
Read more →Aug 10, 2023THNPrivacy / Encryption A widely used Chinese language input app for Windows and Android has been found vulnerable...
Read more →Google has moved to speed up the frequency it pushes out security updates and patches for the Chromium open source...
Read more →In a recent turn of events concerning the victims of the MOVEit vulnerability, a new threat by the infamous Clop...
Read more →Norway-based startup Pistachio on Thursday announced raising €3.25 million (roughly $3.5 million) for its AI-driven cybersecurity training platform. The Pistachio...
Read more →Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks aimed at high-ranking...
Read more →The Police Service of Northern Ireland (PSNI) is probing a second breach of police officers’ personal data that came to...
Read more →Our new IP view offers another point of view on the expanding attack surface Customers often tell us of instances...
Read more →The UK Electoral Commission, entrusted with safeguarding voter information, recently faced a complex breach that triggered a vital public notification. ...
Read more →The code also shows how Yandex can combine data from multiple services. McCrea says in one complex process, an adult’s...
Read more →In the last three years, hackers unknowingly seeking data or malware deployment have found a seemingly vulnerable virtual machine that...
Read more →