![]() |
Description: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat activity targeting applications hosted in their Microsoft Azure cloud environment.
"Threat actors may have accessed client secrets for Commvault's (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure," the agency said.
"This
May 23rd, 2025 (14 days ago)
|
CVE-2025-47181 |
Description: Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.
CVSS: HIGH (8.8) EPSS Score: 0.06%
May 22nd, 2025 (14 days ago)
|
|
Description: Court is in session! In this blog post, we examine the use of a legitimate Microsoft 365 application called “SigParser” identified during an identity compromise. How are OAuth apps used during identity intrusions? Find out here!
May 22nd, 2025 (14 days ago)
|
![]() |
May 22nd, 2025 (15 days ago)
|
![]() |
Description: While credential abuse is a primary initial access vector, identity compromise plays a key role in most stages of a cyber attack. Here’s what you need to know — and how Tenable can help.Identity compromise plays a pivotal role in how attackers move laterally through an organization. Credential abuse is the top initial access vector, implicated in 22% of breaches, according to the 2025 Verizon Data Breach Investigations Report, followed closely by vulnerability exploitation (20%). But identity compromise doesn’t stop after initial access. It plays a key role in five stages of a cyber attack.Understanding the following stages of an attack helps illuminate where identity becomes a threat vector:Initial accessReconnaissanceLateral movement and privilege escalationPersistence and detection evasionDeploymentBelow, we explore actions security teams can take to protect identities in each of these stages. While the guidance we share here is based on protecting on-premises Microsoft Active Directory environments, it’s worth considering how credential compromise can affect Microsoft Entra ID and hybrid identity infrastructure. We also discuss how Tenable Identity Exposure, available in the Tenable One Exposure Management Platform, can be used at each stage to provide security teams with valuable insights to help them proactively reduce their exposure to cyber attacks.Stage 1: Initial accessAttackers need a foothold and credential abuse enables them to get one. To prevent credentials ...
May 22nd, 2025 (15 days ago)
|
![]() |
Description: Signal has updated its Windows app to protect users' privacy by blocking Microsoft's AI-powered Recall feature from taking screenshots of their conversations. [...]
May 22nd, 2025 (15 days ago)
|
![]() |
Description: Signal has added a new default screen protection feature on Windows 11 aimed at blocking Microsoft's AI-powered Recall from capturing its messages. The move is a direct response to Recall's controversial return on Copilot+ PCs, a tool that automatically records screen activity at regular intervals and stores it for later search. Signal adds “Screen Security” …
The post Signal Deploys Countermeasure to Shield Messages from Windows Recall appeared first on CyberInsider.
May 22nd, 2025 (15 days ago)
|
![]() |
May 21st, 2025 (15 days ago)
|
![]() |
Description: A sting involving law enforcement and private sector companies disrupted the Lumma infostealer — malware sold around the globe to cybercriminals and used for millions of infections.
May 21st, 2025 (15 days ago)
|
![]() |
Description: This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2025-29837.
CVSS: MEDIUM (5.5) EPSS Score: 0.06%
May 21st, 2025 (15 days ago)
|