First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process. The activity has been
Proactive strategies for cyber resilience with Wazuh
LummaStealer infections surge after CastleLoader malware campaigns
Webinar Today: Identity Under Attack – Strengthen Your Identity Defenses
Gain practical insights on balancing security, user experience, and operational efficiency while staying ahead of increasingly sophisticated threats.
The post Webinar Today: Identity Under Attack – Strengthen Your Identity Defenses appeared first on SecurityWeek.
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
The campaigns are characterized by the use of malware families like Geta RAT, Ares RAT, and DeskRAT, which are often
GitGuardian Raises $50 Million for Secrets and Non-Human Identity Security
The secrets security company has raised more than $100 million since its creation in 2017.
The post GitGuardian Raises $50 Million for Secrets and Non-Human Identity Security appeared first on SecurityWeek.
Conduent Breach Hits Volvo Group: Nearly 17,000 Employees’ Data Exposed
The Conduent data breach affects at least 25 million individuals, up from 10 million estimated a few months ago.
The post Conduent Breach Hits Volvo Group: Nearly 17,000 Employees’ Data Exposed appeared first on SecurityWeek.
Zast.AI Raises $6 Million for AI-Powered Code Security
The startup relies on AI agents to identify software vulnerabilities and validate them before reporting.
The post Zast.AI Raises $6 Million for AI-Powered Code Security appeared first on SecurityWeek.
Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused to bypass security features, escalate privileges, and trigger a denial-of-service (DoS) condition.
Elsewhere
