Security News

Ongoing phishing attack abuses Google Calendar to bypass spam filters
2024-12-18 23:16

An ongoing phishing scam is abusing Google Calendar invites and Google Drawings pages to steal credentials while bypassing spam filters. [...]

Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS
2024-12-12 12:35

Details have emerged about a now-patched security vulnerability in Apple's iOS and macOS that, if successfully exploited, could sidestep the Transparency, Consent, and Control (TCC) framework and...

Ivanti warns of maximum severity CSA auth bypass vulnerability
2024-12-10 19:40

Ivanti warned customers on Tuesday about a new maximum-severity authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution. [...]

QR codes bypass browser isolation for malicious C2 communication
2024-12-08 15:27

Mandiant has identified a novel method to bypass contemporary browser isolation technology and achieve command-and-control C2 operations. [...]

PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files
2024-12-06 06:01

Still unpatched 100+ days later, watchTowr says A zero-day arbitrary file read vulnerability in Mitel MiCollab can be chained with a now-patched critical bug in the same platform to give attackers...

65% of office workers bypass cybersecurity to boost productivity
2024-12-04 04:00

High-risk access exists throughout the workplace, in almost every job role, proving that the time has come for organizations to re-think the way they protect their workforce, according to...

Phishers send corrupted documents to bypass email security
2024-12-03 12:04

Phishers have come up with a new trick for bypassing email security systems: corrupted MS Office documents. The spam campaign Malware hunting service Any.Run has warned last week about email...

Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections
2024-11-25 09:16

Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called Bring Your Own Vulnerable Driver (BYOVD) to disarm security protections and ultimately gain...

North Korean hackers create Flutter apps to bypass macOS security
2024-11-12 13:00

North Korean threat actors target Apple macOS systems using trojanized Notepad apps and minesweeper games created with Flutter, which are signed and notarized by legitimate Apple developer IDs. [...]

Why the long name? Okta discloses auth bypass bug affecting 52-character usernames
2024-11-04 11:28

Mondays are for checking months of logs, apparently, if MFA's not enabled In potentially bad news for those with long names and/or employers with verbose domain names, Okta spotted a security hole...