Topic: malicious applications
-
Hijacked OAuth Apps: Your Cloud's Secret Backdoor
Cybercriminals exploit internal OAuth applications to create persistent backdoors in corporate cloud systems, bypassing security measures like password resets and multi-factor authentication. Attackers deceive users into approving malicious OAuth apps or compromise admin accounts to create truste...
Read More » -
Azure AD Credentials Leaked in Public App Settings
A critical vulnerability in Azure Active Directory was discovered, where credentials were exposed in public configuration files, allowing potential exploitation. Attackers could use these credentials to impersonate trusted applications, gaining unauthorized access to sensitive data and systems wi...
Read More » -
Phishing Leads EU Cyber Intrusions, ENISA Reports
Phishing was the leading initial attack method in the EU, responsible for 60% of intrusions, with outdated mobile and OT systems being prime targets. DDoS attacks comprised 77% of all incidents, largely driven by hacktivism, but only 2% caused service disruptions, with groups like NoName057(16) e...
Read More »