Security News

Snowflake compromised? Attackers exploit stolen credentials
2024-05-31 19:04

Have attackers compromised Snowflake or just their customers' accounts and databases? Conflicting claims muddy the situation. "From an enterprise perspective, Snowflake is typically set up as a cloud-based data warehousing solution. Enterprises choose a cloud provider, and set up their Snowflake account within the chosen region. Data is ingested from various sources, transformed, and analyzed using SQL," Doron Karmi, Senior Cloud Security Researcher at Mitiga, told Help Net Security.

Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting
2024-05-31 10:10

The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe with the HeadLace malware and credential-harvesting web pages. APT28,...

Okta Warns of Credential Stuffing Attacks Targeting Customer Identity Cloud
2024-05-30 06:52

Okta is warning that a cross-origin authentication feature in Customer Identity Cloud (CIC) is susceptible to credential stuffing attacks orchestrated by threat actors. "We observed that the...

Okta warns of credential stuffing attacks targeting its CORS feature
2024-05-29 15:46

Okta warns that a Customer Identity Cloud feature is being targeted in credential stuffing attacks, stating that numerous customers have been targeted since April. Okta says it identified credential stuffing attacks starting on April 15, 2024, which targeted endpoints utilizing Customer Identity Cloud's cross-origin authentication feature.

Malicious Android Apps Pose as Google, Instagram, WhatsApp, to Steal Credentials
2024-05-10 10:21

Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users' credentials from compromised devices. "This malware uses...

Combatting Deepfakes in Australia: Content Credentials is the Start
2024-05-08 09:00

There is growing consensus on how to address the challenge of deepfakes in media and businesses, generated through technologies such as AI. Earlier this year, Google announced that it was joining the Coalition for Content Provenance and Authenticity as a steering committee member - other organisations in the C2PA include OpenAI, Adobe, Microsoft, AWS and the RIAA. With growing concern about AI misinformation and deepfakes, IT professionals will want to pay close attention to the work of this body, and particularly Content Credentials, as the industry formalises standards governing how visual and video data is managed. Content Credentials are a form of digital metadata that creators can attach to their content to ensure proper recognition and promote transparency.

APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
2024-05-07 13:25

The Iranian state-backed hacking outfit called APT42 is making use of enhanced social engineering schemes to infiltrate target networks and cloud environments. Targets of the attack...

Week in review: PoCs allow persistence on Palo Alto firewalls, Okta credential stuffing attacks
2024-05-05 08:00

Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgradesThere are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the company has confirmed on Monday, but they are "Not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability." Okta warns customers about credential stuffing onslaughtCredential stuffing attacks have exploded this April, Okta warns, and advises its customers to use available tools to block access requests originating from residential proxies before authentication takes place.

New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
2024-05-02 05:04

A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the devices and gather authentication data from...

Adobe Adds Firefly and Content Credentials to Bug Bounty Program
2024-05-01 13:00

Security researchers in Adobe's bug bounty program can now pick up rewards for finding vulnerabilities in Adobe Firefly and Content Credentials. Members of Adobe's public bug bounty program will be eligible to work with Adobe Firefly and Content Credentials in the second half of 2024, and applications for the private program are open.