Topic: persistent access
-
Hijacked OAuth Apps: Your Cloud's Secret Backdoor
Cybercriminals exploit internal OAuth applications to create persistent backdoors in corporate cloud systems, bypassing security measures like password resets and multi-factor authentication. Attackers deceive users into approving malicious OAuth apps or compromise admin accounts to create truste...
Read More » -
Ransomware Attackers Wipe Azure Data and Backups After Theft
A new wave of cloud-focused ransomware attacks by group Storm-0501 systematically wipes primary data and backups in Microsoft Azure, leaving organizations with no recovery options. The group exploits native cloud functionalities to exfiltrate large volumes of data without on-premises hardware, ma...
Read More » -
Chinese Tech Firms Tied to Global Salt Typhoon Hacking Campaigns
Three Chinese tech firms are identified as key enablers of the global Salt Typhoon hacking campaigns, supplying tools and services to Chinese state security and military bodies for cyber espionage against governments, telecoms, and critical infrastructure. The hacking campaigns exploit known and ...
Read More »