Malicious Oauth app enables attackers to send spam through corporate cloud tenants

Microsoft investigated a new kind of attack where malicious OAuth applications were deployed on compromised cloud tenants before being used for mass spamming.
The post Malicious Oauth app enables attackers to send spam through corporate cloud tenants … Continue reading Malicious Oauth app enables attackers to send spam through corporate cloud tenants

Pay-per-install services provide access to thousands of compromised computers

PrivateLoader malware, which enables cybercriminals to buy thousands of infected computers in the U.S. and in other regions, is one of the most prevalent security threats.
The post Pay-per-install services provide access to thousands of compromised com… Continue reading Pay-per-install services provide access to thousands of compromised computers

North Korean cyberespionage actor Lazarus targets energy providers with new malware

Lazarus, a North Korean cyberespionage group, keeps hitting energy providers in the U.S., Canada and Japan with a new malware arsenal.
The post North Korean cyberespionage actor Lazarus targets energy providers with new malware appeared first on TechRe… Continue reading North Korean cyberespionage actor Lazarus targets energy providers with new malware

Sliver offensive security framework increasingly used by threat actors

The offensive security tool used by penetration testers is also being used by threat actors from the ransomware and cyberespionage spheres.
The post Sliver offensive security framework increasingly used by threat actors appeared first on TechRepublic.
Continue reading Sliver offensive security framework increasingly used by threat actors

Iranian cyberespionage group uses new Hyperscrape tool to extract emails from victims’ mailboxes

Learn more about a new Iranian tool dubbed Hyperscrape and how it is used by a cyberespionage group to extract content from victims’ inboxes.
The post Iranian cyberespionage group uses new Hyperscrape tool to extract emails from victims’ mailboxes appe… Continue reading Iranian cyberespionage group uses new Hyperscrape tool to extract emails from victims’ mailboxes

Cookie theft threat: When Multi-Factor authentication is not enough

A lot of companies have deployed multi-factor authentication, yet attackers have some ways to bypass it—the most used one being cookie theft.
The post Cookie theft threat: When Multi-Factor authentication is not enough appeared first on TechRepublic.
Continue reading Cookie theft threat: When Multi-Factor authentication is not enough