Varonis

Sophisticated Phishing Campaign Targets a UK-based Insurance Firm

A sophisticated phishing campaign targeted a U.K.-based insurance firm, using a trusted sender's compromised email to deploy a deletion rule, evade detection, and trick users into credential theft via a fake Microsoft login page.

Data Theft Risk in Salesforce by Manipulating Public Links

The vulnerability was related to the undocumented Salesforce Aura API and SOQL subqueries, allowing a blind SOQL injection attack to retrieve customer information, including personally identifiable information (PII).

The Power and Peril of RMM Tools

RMM tools have become essential in managing remote devices, but they also pose risks if exploited by threat actors. Attackers can gain remote access to devices, exfiltrate data, and remain undetected.

Sidestepping SharePoint Security: Two New Techniques to Evade Exfiltration Detection

These techniques can bypass the detection and enforcement policies of traditional tools, such as cloud access security brokers, data loss prevention, and SIEMs, by hiding downloads as less suspicious access and sync events.

Outlook Vulnerability Discovery and New Ways to Leak NTLM Hashes

Attackers can use stolen NTLM v2 hashes for offline brute-force attacks or authentication relay attacks, potentially compromising user accounts and gaining unauthorized access.

HardBit 2.0 Engages in Clever Ransom Negotiation Based on Cyber Insurance Coverage

Seemingly improving upon their initial release, HardBit version 2.0 was introduced toward the end of November 2022, with samples seen throughout the end of 2022 and into 2023.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags