Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report “does not identify an underlying security issue in our products.” Continue reading Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Design flaw leaves Google Workspace vulnerable for takeover

A design flaw in Google Workspace’s domain-wide delegation feature, discovered by Hunters’ Team Axon, can allow attackers to misuse existing delegations, enabling privilege escalation and unauthorized access to Workspace APIs without Super Admin privil… Continue reading Design flaw leaves Google Workspace vulnerable for takeover

Design Flaw in Domain-Wide Delegation Could Leave Google Workspace Vulnerable for Takeover, Says Cybersecurity Company Hunters

By Owais Sultan
A severe design flaw in Google Workspace’s domain-wide delegation feature discovered by threat hunting experts from Hunters’ Team Axon,…
This is a post from HackRead.com Read the original post: Design Flaw in Domain-Wide Del… Continue reading Design Flaw in Domain-Wide Delegation Could Leave Google Workspace Vulnerable for Takeover, Says Cybersecurity Company Hunters

Hunters partners with Kudelski Security to help companies strengthen their cyber resilience

To help companies strengthen their cyber resilience and revolutionize their security operations, Hunters and Kudelski Security have entered a strategic partnership, cybersecurity company Hunters announced. As part of the partnership, Kudelski Security … Continue reading Hunters partners with Kudelski Security to help companies strengthen their cyber resilience

Black Hat USA 2022 video walkthrough

In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal Security, Adaptive Shield, Airgap, Akamai, Anomali, Arctic Wolf Networks, Aris… Continue reading Black Hat USA 2022 video walkthrough

The future of SOCs: Automation where it matters

Sophisticated attacks, remote work needs and rapidly changing technologies challenge organizations to manage IT security while containing costs and using overburdened staff. Security operations centers (SOCs) increasingly use automation to manage compl… Continue reading The future of SOCs: Automation where it matters

Infosec products of the month: May 2022

Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, Fortinet, Hunters, Enpass, iDenfy, Kasten by Veeam, Kingston Digital, Microsoft, … Continue reading Infosec products of the month: May 2022

New infosec products of the week: May 27, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Corelight, Fortinet, Hunters, Kingston Digital, Netenrich, PIXM, and SafeGuard Cyber. PIXM Mobile provides real-time protection from phishing attacks on mobile d… Continue reading New infosec products of the week: May 27, 2022

Hunters SOC Platform enhancements enable users to prioritize incidents based on their urgency

Hunters announced new capabilities in the Hunters SOC Platform to enhance and accelerate security operations workflows for data ingestion and normalization, threat detection, investigation and response. The advances free up data engineers, security eng… Continue reading Hunters SOC Platform enhancements enable users to prioritize incidents based on their urgency