Category: EN

Phishing and OAuth Token Flaws Lead to Full Microsoft 365 Compromise

Modern web applications frequently introduce unforeseen attack surfaces through seemingly harmless features designed for user engagement, such as newsletter signups, contact forms, and password resets. While individual vulnerabilities might appear manageable in isolation, sophisticated adversaries increasingly chain these minor flaws…

Flickr Security Incident Tied to Third-Party Email System

Potential breach at Flickr exposes usernames, email addresses, IP addresses, and activity data. The post Flickr Security Incident Tied to Third-Party Email System appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Flickr Security…

The Winter Olympics Are Back, and So Are Attackers

The Olympics have traditionally been a major attack vector for cyber disruption, espionage, and financially motivated attacks.   The 2018 Winter Olympic Games in PyeongChang saw the Olympic Destroyer malware used to disrupt Wi-Fi, ticket, and venue systems during the opening…

How Samsung Knox Helps Stop Your Network Security Breach

As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However (and it’s a big “however”), the increasing use…