Category: EN

Threat Actors Attacking Job Seekers With Three New Unique Adversaries

A significant surge in sophisticated recruitment scams has emerged, with cybercriminals exploiting economic vulnerabilities and the competitive job market to target desperate job seekers. These scams employ increasingly refined social engineering tactics that blend legitimate recruitment practices with fraudulent schemes,…

Threat Brief: CVE-2025-31324

CVE-2025-31324 impacts SAP NetWeaver’s Visual Composer Framework. We share our observations on this vulnerability using incident response cases and telemetry. The post Threat Brief: CVE-2025-31324 appeared first on Unit 42. This article has been indexed from Unit 42 Read the…

How Signal, WhatsApp, Apple, and Google Handle Encrypted Chat Backups

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Encrypted chat apps like Signal and WhatsApp are one of the best ways to keep your digital conversations as private as possible. But if you’re not careful…

Stay Confident with Robust Secrets Management

Are You Leaving Your Digital Doors Unlocked? Organizations are increasingly leaning on cloud-based solutions for convenience, scalability, and speed. However, with businesses make the cloud their home, the reality of cybersecurity threats and challenges facing this new frontier remains undeniable.…

How Protected Are Your NHIs in Cloud Environments?

Are Your Non-Human Identities Adequately Shielded in The Vast Cloud Space? Potentially, many organizations can underestimate the importance of managing Non-Human Identities (NHIs) effectively to bolster their cloud security. Are you one of them? NHIs are machine identities crucial for…

Feel Reassured with Advanced Secret Scanning

Are You Adequately Protecting Your Non-Human Identities? Where businesses increasingly turn to the cloud for their operations, one might wonder if these organizations are effectively safeguarding their Non-Human Identities (NHIs) and the secrets they hold. Mismanagement of NHIs can result…

Congratulations to the Top MSRC 2025 Q1 Security Researchers!

Congratulations to all the researchers recognized in this quarter’s Microsoft Researcher Recognition Program leaderboard! Thank you to everyone for your hard work and continued partnership to secure customers. The top three researchers of the 2025 Q1 Security Researcher Leaderboard are…