News

The ongoing campaign, first detected in early 2025, is designed to use the OAuth applications as a gateway to obtain ...
A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges.
Most payments are less than $1 million, but 8% of successfully attacked US companies have paid a ransom four or more times, ...
Proofpoint observed campaigns impersonating trusted brands like SharePoint and DocuSign with malicious OAuth applications to ...
The activity has been attributed to Storm-2603, which, according to Microsoft, is a suspected China-based threat actor that ...
In a world increasingly dependent on digital infrastructure, cybercrime has become an ever-prevalent threat. In the latest wave of cyberattacks, ...
Did China sneak a peak into ToolShell? ToolShell hacking in South Africa. Cisco flaws. Arizona woman sentenced for aiding ...
Solution providers tell CRN they fear their own company’s or their customers’ data could be made public in the wake of ...
Take a proactive approach to cybersecurity and business continuity including protecting your Microsoft 365 data with a secure ...
This month, Microsoft issued an advisory warning about a critical SharePoint vulnerability that was actively exploited, ...
A new SharePoint exploit bypassed Microsoft’s patch, exposing over 8,000 systems and revealing deep flaws in on-premise ...
Allianz Life Insurance Company of North America (Allianz Life) is notifying 1.4 million customers, financial professionals, ...