🖋️ Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited, could allow websites to access a user's entire cloud storage content, as opposed to just the files selected for upload via the tool. "This stems from overly broad OAuth scopes and misleading consent screens that fail to clearly explain the extent of access being granted,.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
📔 New Russian State Hacking Group Hits Europe and North America 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
A newlydiscovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
New Russian State Hacking Group Hits Europe and North America
A newly-discovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned
🕵️♂️ CISA Warns of Attacks Targeting Commvault SaaS Environment 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
A threat actor has gained access to Microsoft 365 environments of a small number of customers of Commvault's Metallic service.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Darkreading
CISA Warns of Attacks Targeting Commvault SaaS Environment
A threat actor has gained access to Microsoft 365 environments of a small number of customers of Commvault's Metallic service.
📔 Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generator Websites 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
A Vietnamnexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
Vietnam-Nexus Hackers Distribute Malware Via Fake AI Video Generators
A Vietnam-nexus hacking group distributes infostealers and backdoors via social media ads promoting fake AI generator websites
📔 DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
A targeted cyberattack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool
A targeted cyber-attack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft
📔 #Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity
🕵️♂️ DragonForce Ransomware Strikes MSP in Supply Chain Attack 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
DragonForce, a ransomware "cartel" that has gained significant popularity since its debut in 2023, attacked an MSP as part of a recent supply chain attack, via known SimpleHelp bugs.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Darkreading
DragonForce Ransomware Strikes MSP in Supply Chain Attack
DragonForce, a ransomware "cartel" that has gained significant popularity since its debut in 2023, attacked an MSP as part of a recent supply chain attack.
📔 DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
A targeted cyberattack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool
A targeted cyber-attack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft
📔 New Russian State Hacking Group Hits Europe and North America 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
A newlydiscovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
New Russian State Hacking Group Hits Europe and North America
A newly-discovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft warned
🖋️ New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Embedded Linuxbased Internet of Things IoT devices have become the target of a new botnet dubbed PumaBot. Written in Go, the botnet is designed to conduct bruteforce attacks against SSH instances to expand in size and scale and deliver additional malware to the infected hosts. "Rather than scanning the internet, the malware retrieves a list of targets from a commandandcontrol C2 server.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
📔 Malicious Machine Learning Model Attack Discovered on PyPI 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
Malicious Machine Learning Model Attack Discovered on PyPI
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware
🕵️♂️ MathWorks, Creator of MATLAB, Confirms Ransomware Attack 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
The attack dirsupted MathWorks' systems and online applications, but it remains unclear which ransomware group targeted the software company and whether they stole any data.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Darkreading
MathWorks, Creator of MATLAB, Confirms Ransomware Attack
The attack dirsupted MathWorks' systems and online applications, but it remains unclear which ransomware group targeted the software company and whether they stole any data.
📔 Malicious Machine Learning Model Attack Discovered on PyPI 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
Malicious Machine Learning Model Attack Discovered on PyPI
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware
🖋️ Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited, could allow websites to access a user's entire cloud storage content, as opposed to just the files selected for upload via the tool. "This stems from overly broad OAuth scopes and misleading consent screens that fail to clearly explain the extent of access being granted,.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
📔 DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
A targeted cyberattack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
DragonForce Ransomware Leveraged in MSP Attack Using RMM Tool
A targeted cyber-attack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft
🖋️ From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Stealer malware no longer just steals passwords. In 2025, it steals live sessionsand attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services, the real threat is unfolding in the enterprise. Flares latest research, The Account and Session Takeover Economy, analyzed over 20 million stealer logs and tracked attacker activity across.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
📔 #Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity
🕵️♂️ FBI: Silent Ransom Group Adopts Vishing Campaign Against Law Firms 🕵️♂️
📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
The nonransomware extortion group has switched up tactics and victimology in a deliberate and focused campaign similar to those of other attackers focused on stealing sensitive data.📖 Read more.
🔗 Via "Dark Reading"
----------
👁️ Seen on @cibsecurity
Darkreading
Silent Ransom Group Launches Vishing Attacks on Law Firms
The non-ransomware extortion group has switched up tactics and victimology in a deliberate and focused campaign similar to those of other attackers focused on stealing sensitive data
📔 #Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025 📔
📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity.📖 Read more.
🔗 Via "Infosecurity Magazine"
----------
👁️ Seen on @cibsecurity
Infosecurity Magazine
#Infosec2025: Rory Stewart and Paul Chichester to Headline at Infosecurity Europe 2025
Former UK government minister Rory Stewart and NCSC Director of Operations Paul Chichester will explore the growing link between geopolitics and cybersecurity
🖋️ New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
Embedded Linuxbased Internet of Things IoT devices have become the target of a new botnet dubbed PumaBot. Written in Go, the botnet is designed to conduct bruteforce attacks against SSH instances to expand in size and scale and deliver additional malware to the infected hosts. "Rather than scanning the internet, the malware retrieves a list of targets from a commandandcontrol C2 server.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
🖋️ Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware 🖋️
📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System CMS to deploy multiple payloads, including a cryptocurrency miner, a loader dubbed Mimo Loader, and residential proxyware. The vulnerability in question is CVE202532432, a maximum severity flaw in Craft CMS that was patched in.📖 Read more.
🔗 Via "The Hacker News"
----------
👁️ Seen on @cibsecurity
👍1