top of page
Search


New Win-DoS Flaws Could Weaponize Windows Domain Controllers for DDoS Attacks
A newly discovered attack method could allow hackers to crash public Windows domain controllers (DCs) worldwide and weaponize them for...
Aug 10


Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home
For likely the first time ever, security researchers from Safebreach have shown how AI can be hacked to create real-world havoc, allowing...
Aug 5


Safebreach research shows Google Calendar invites let researchers hijack Gemini to leak user data
By sending a calendar invite with an embedded prompt injection, often hidden in the event title, attackers can potentially exfiltrate...
Aug 3


Ransomware Attacks Escalate to Physical Threats Against Executives
Ransomware actors are resorting to extreme measures to pressure victims into paying demands, including threats of physical harm to...
Jul 30


nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
New research has uncovered continued risk from a known security weakness in Microsoft's Entra ID , potentially enabling malicious actors...
Jun 24


Semperis adds detection for dMSA attacks in Windows Server
S emperis has announced new detection capabilities in its Directory Services Protector platform in collaboration with Akamai to address...
Jun 9


Enterprises struggle with serious gaps in cyber response plans
A new survey of 1,000 businesses across the UK, UK, Europe and the Asia-Pacific region reveals a worrying disconnect between...
May 13


Water and Electricity Companies Suffer Severe Damage from Cyber-Attacks
80 percent of operators were targeted multiple times. More than half of cyber-attacks experienced by critical services disrupted...
Apr 4


Google Released Second Fix for Quick Share Flaws After Patch Bypass
The patches Google rolled out last year to address vulnerabilities in the Quick Share data transfer utility that could lead to remote...
Apr 2


Cybercriminals hope to catch public sector off-guard
Organizations are leaving their security teams understaffed during critical times, shows research. As cyberattacks continue to plague...
Jan 1


Unpatched Active Directory Flaw Can Crash Any Microsoft Server
One of two critical Active Directory Domain Controller vulnerabilities patched by Microsoft last month goes beyond the original...
Jan 1


This Windows Update exploit is downright terrifying
Windows Update may occasionally backfire with faulty patches , but for the most part, it’s meant to keep us safe from the latest threats....
Aug 10, 2024


“UnOAuthorized” Microsoft Entra ID (Azure AD) Vulnerability Let Attackers Gain Global Admin Access
According to the research team at Semperis, the vulnerability was discovered in the OAuth 2.0 scope (permissions) of Entra ID, which...
Aug 8, 2024


Design flaw could allow hackers to roll back Microsoft Windows updates
Some of Microsoft’s most important tools for protecting Windows users from malicious hackers can be twisted into being used in attacks,...
Aug 6, 2024


Some companies pay ransomware attackers multiple times, survey finds
Nearly one-third of companies that suffered a ransomware attack paid a ransom four or more times in the past 12 months to regain access...
Jul 30, 2024


Researchers claim Windows Defender can be fooled into deleting databases
Researchers at US/Israeli infosec outfit SafeBreach last Friday discussed flaws in Microsoft and Kaspersky security products that can...
Apr 21, 2024


Semperis Researchers Discover a New Malicious Variant of the Attack Technique used in the 2020 SolarWinds Breach
Semperis announced that its security research team discovered a new variant of the notorious Golden SAML attack technique and dubbed it...
Feb 23, 2024


New PoolParty Process Injection Techniques Outsmart Top EDR Solutions
A new collection of eight process injection techniques, collectively dubbed PoolParty, could be exploited to achieve code execution in...
Dec 10, 2023


Researchers Uncover Undetectable Crypto Mining Technique on Azure Automation
Cybersecurity researchers have developed what's the first fully undetectable cloud-based cryptocurrency miner leveraging the Microsoft...
Nov 7, 2023


Drops are changing the future of presbyopia treatment
In our pursuit of novelty, we sometimes forget that significant treatment breakthroughs have been made thanks to the reformulation or...
Oct 19, 2023
bottom of page
