The Breach News

Salesforce Reports New OAuth Breach Associated with Gainsight Applications

Salesforce recently issued a security advisory alerting users to unauthorized access to customer data via third-party applications provided by Gainsight. This breach not only raises alarm bells across the user base but also highlights persistent vulnerabilities associated with OAuth integrations—an area already marked by significant data breaches within the Salesforce…

Read MoreSalesforce Reports New OAuth Breach Associated with Gainsight Applications

Serious Vulnerabilities Expose 92,000 D-Link NAS Devices to Malware Threats

Cybersecurity Alert: Vulnerabilities Found in D-Link NAS Devices Open Doors to Exploitation Recent findings reveal that threat actors are actively exploiting security weaknesses affecting approximately 92,000 D-Link network-attached storage (NAS) devices exposed to the internet. The vulnerabilities, identified as CVE-2024-3272 and CVE-2024-3273, are categorized with high CVSS scores of 9.8…

Read MoreSerious Vulnerabilities Expose 92,000 D-Link NAS Devices to Malware Threats

Utilize Microsoft’s One-Click Tool to Safeguard Against Exchange Attacks

On Monday, Microsoft announced the rollout of a new one-click mitigation software aimed at shielding susceptible environments from the ongoing ProxyLogon cyberattacks targeting Exchange Servers. This tool, known as the Exchange On-premises Mitigation Tool (EOMT), employs PowerShell to implement necessary countermeasures against known vulnerabilities, specifically CVE-2021-26855. It also conducts scans…

Read MoreUtilize Microsoft’s One-Click Tool to Safeguard Against Exchange Attacks

How CISOs Should Brace for Cybersecurity Threats Amidst the Coronavirus Pandemic

The ongoing COVID-19 pandemic has triggered widespread economic disruption, leaving organizations grappling with heightened uncertainty. A recent report from cybersecurity firm Cynet highlights the serious implications for information security, noting a notable uptick in cyber threats that exploit the current crisis. In response to the evolving threat landscape, Cynet has…

Read MoreHow CISOs Should Brace for Cybersecurity Threats Amidst the Coronavirus Pandemic

Essential Backup vs. Cyber Resilience: Key Differences Explained

An OnDemand Webinar from Rubrik In the evolving landscape of cybersecurity, a recent incident underscores the continuous threats faced by businesses in the digital age. A prominent organization fell victim to a sophisticated cyber-attack that has raised alarms across various sectors. The breach highlights vulnerabilities that are alarmingly common among…

Read MoreEssential Backup vs. Cyber Resilience: Key Differences Explained

DoorDash Data Breach Exposes the Human Factor in Cybersecurity Vulnerabilities

DoorDash has recently acknowledged a significant data breach impacting its customers, delivery personnel, and merchants. The compromised data includes personal details such as names, email addresses, phone numbers, and residential addresses. Fortunately, the company reported that no financial information or government ID data was accessed during this incident, and there…

Read MoreDoorDash Data Breach Exposes the Human Factor in Cybersecurity Vulnerabilities

Researchers Uncover Vulnerabilities in LG Smart TVs That Grant Root Access

Recent security assessments have uncovered multiple vulnerabilities in LG’s webOS, the operating system used in its smart TVs, presenting risks that could allow unauthorized access and control over affected devices. Discovered by the cybersecurity firm Bitdefender, these issues were first reported in November 2023, with LG issuing patches to address…

Read MoreResearchers Uncover Vulnerabilities in LG Smart TVs That Grant Root Access

As AI Ascends, Cisco Issues a Critical Warning on the Dangers of Outdated Technology

Outdated digital infrastructure, including routers, network switches, and network-attached storage systems, has quietly emerged as a significant risk for organizations. While it may seem more cost-effective in the short term to maintain these aging devices in obscurity, doing so often means relying on outdated configurations that are no longer secured…

Read MoreAs AI Ascends, Cisco Issues a Critical Warning on the Dangers of Outdated Technology