Security researchers at the AhnLab Security Intelligence Center (ASEC) have uncovered a sophisticated cyberattack campaign targeting Microsoft Windows Server Update Services (WSUS) infrastructure. The attackers […]
Author: cyberbytes
Clop Ransomware Claims Oracle Breach Using E-Business Suite 0-Day
The notorious Clop ransomware gang, also known as Graceful Spider, has listed Oracle Corporation on its dark web leak site, claiming to have successfully breached […]
Salesforce Confirms Customer Data Was Exposed in Gainsight Breach
Salesforce has identified unusual activity involving applications published by Gainsight that are connected to the Salesforce platform. The company’s investigation revealed that this suspicious activity […]
Operation DreamJob Attacks on Manufacturing via WhatsApp Web
Operation DreamJob, a longstanding North Korean cyberespionage campaign, has once again demonstrated its lethal effectiveness by targeting manufacturing organizations through deceptive job-related messages delivered via […]
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled […]
Critical Grafana Flaw Lets Attackers Escalate Privileges
Grafana Labs has released critical security patches addressing a severe vulnerability in its SCIM provisioning feature that could allow attackers to escalate privileges or impersonate […]
Root causes of security breaches remain elusive — jeopardizing resilience
Post-incident analysis remains a critical concern at most security organizations today. According to Foundry’s Security Priorities study, 57% of security leaders report their organization struggled […]
Recognizing and responding to cyber threats: What differentiates NDR, EDR and XDR
The constantly growing number of acronyms in cyber security makes it difficult to maintain an overview and compare individual technologies. One example is the three […]
Schatten-IT: Viele Fachkräfte nutzen KI ohne Erlaubnis
Schatten-KI in Unternehmen birgt erhebliche Risiken. phloxii – shutterstock.com Immer mehr Fachkräfte in den sogenannten MINT-Berufen setzen Künstliche Intelligenz (KI) am Arbeitsplatz ohne die Genehmigung […]
Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
Salesforce has warned of detected “unusual activity” related to Gainsight-published applications connected to the platform. “Our investigation indicates this activity may have enabled unauthorized access […]