Emerging Attacker Exploit: Microsoft Cross-Tenant Synchronization
Aug 10, 2023The Hacker NewsThreat Detection / Attack Signal Attackers continue to target Microsoft identities to gain access to connected Microsoft applications and federated SaaS…
Aug 10, 2023The Hacker NewsThreat Detection / Attack Signal Attackers continue to target Microsoft identities to gain access to connected Microsoft applications and federated SaaS…
Adaptive Shield announced its Identity Threat Detection and Response (ITDR) capabilities to help organizations mitigate identity-related threats. When paired with its SaaS Security Posture Management…
Aug 10, 2023THNPrivacy / Encryption A widely used Chinese language input app for Windows and Android has been found vulnerable to serious security flaws that…
Google has moved to speed up the frequency it pushes out security updates and patches for the Chromium open source code underpinning the Chrome web…
In a recent turn of events concerning the victims of the MOVEit vulnerability, a new threat by the infamous Clop ransomware group has surfaced, accompanied…
Norway-based startup Pistachio on Thursday announced raising €3.25 million (roughly $3.5 million) for its AI-driven cybersecurity training platform. The Pistachio platform leverages AI to create…
Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks aimed at high-ranking executives at prominent companies. According…
The Police Service of Northern Ireland (PSNI) is probing a second breach of police officers’ personal data that came to light barely 24 hours after…
Our new IP view offers another point of view on the expanding attack surface Customers often tell us of instances where someone in their team…
The UK Electoral Commission, entrusted with safeguarding voter information, recently faced a complex breach that triggered a vital public notification. In a digital age, securing…
The code also shows how Yandex can combine data from multiple services. McCrea says in one complex process, an adult’s search data may be pulled…
In the last three years, hackers unknowingly seeking data or malware deployment have found a seemingly vulnerable virtual machine that is hosted in the U.S.,…