Tag Microsoft

Microsoft Acknowledges Source Code and Customer Data Breach by Russian Hackers

On March 9, 2024, Microsoft confirmed that the Kremlin-affiliated cyber group, Midnight Blizzard (also known as APT29 or Cozy Bear), successfully infiltrated some of its source code repositories and internal systems. This breach was initially uncovered in January 2024. The tech company stated, "We have recently observed that Midnight Blizzard is leveraging information obtained from our corporate email systems to gain, or attempt to gain, unauthorized access." While the investigation into the breach’s scope continues, Microsoft assures that there is no evidence suggesting compromise of customer-facing systems hosted on its platform. Microsoft also noted that the Russian state-sponsored hackers are trying to exploit various types of confidential information, including interactions between customers and Microsoft over email; however, specific details have not been disclosed.

Microsoft Confirms Source Code and Sensitive Data Breach by Russian Hackers On March 8, 2024, Microsoft disclosed that the Kremlin-supported cyber threat group known as Midnight Blizzard, also referred to as APT29 or Cozy Bear, has successfully infiltrated some of its source code repositories and internal systems. This revelation follows…

Read More

Microsoft Acknowledges Source Code and Customer Data Breach by Russian Hackers

On March 9, 2024, Microsoft confirmed that the Kremlin-affiliated cyber group, Midnight Blizzard (also known as APT29 or Cozy Bear), successfully infiltrated some of its source code repositories and internal systems. This breach was initially uncovered in January 2024. The tech company stated, "We have recently observed that Midnight Blizzard is leveraging information obtained from our corporate email systems to gain, or attempt to gain, unauthorized access." While the investigation into the breach’s scope continues, Microsoft assures that there is no evidence suggesting compromise of customer-facing systems hosted on its platform. Microsoft also noted that the Russian state-sponsored hackers are trying to exploit various types of confidential information, including interactions between customers and Microsoft over email; however, specific details have not been disclosed.

New Variant of BlackCat Ransomware Leverages Advanced Impacket and RemCom Tools

Microsoft recently reported the identification of a new variant of the BlackCat ransomware, also known as ALPHV or Noberus. This ransomware strain integrates tools such as Impacket and RemCom, enhancing its capabilities for lateral movement within compromised networks and facilitating remote code execution. The unveiling comes on the heels of…

Read MoreNew Variant of BlackCat Ransomware Leverages Advanced Impacket and RemCom Tools

U.S. Cyber Safety Board Criticizes Microsoft for Breach Involving China-Based Hackers

The U.S. Cyber Safety Review Board (CSRB) has issued a stern rebuke to Microsoft for significant security failures that enabled a cyberattack by a Chinese state-sponsored group known as Storm-0558. This breach, which occurred last year, compromised nearly two dozen organizations in both Europe and the U.S. The findings, shared…

Read MoreU.S. Cyber Safety Board Criticizes Microsoft for Breach Involving China-Based Hackers

Essential Principles of Cloud Security Stress Testing

Cloud Security: The Imperative of Penetration Testing "Defenders think in lists, attackers think in graphs," remarked John Lambert from Microsoft, encapsulating the contrasting mindsets of cybersecurity defenders and attackers. This fundamental difference underscores the need for organizations to adopt an attacker’s viewpoint in bolstering their cybersecurity measures. While traditional defense…

Read MoreEssential Principles of Cloud Security Stress Testing

Two LAPSUS$ Hackers Found Guilty in London Court for Notorious Tech Firm Breaches

Two UK Teenagers Convicted for LAPSUS$ Hacking Activities Targeting Major Tech Firms A jury in London has convicted two teenagers for their roles in the notorious LAPSUS$ hacking group, also known as Slippy Spider. This gang has been linked to a series of high-profile cyberattacks against leading technology companies, employing…

Read MoreTwo LAPSUS$ Hackers Found Guilty in London Court for Notorious Tech Firm Breaches

New Bolster CEO Talks About AI-Powered Fraud Prevention and Data Security

Bolster Appoints Rod Schultz as CEO to Address Internal Data Security and AI-Driven Threats Rod Schultz has been appointed as the new CEO of Bolster, a Silicon Valley-based brand security startup, with a mandate to expand the company’s focus from protecting brands against external threats to addressing internal data security…

Read MoreNew Bolster CEO Talks About AI-Powered Fraud Prevention and Data Security

UK Banks Advised to Prepare for Potential CrowdStrike-Style Outage

Regulators Urge Enhanced Security for Third-Party Services Following CrowdStrike Outage In light of the significant disruption caused by a cybersecurity incident involving CrowdStrike, the U.K. Financial Conduct Authority (FCA) has issued a directive urging financial institutions to bolster their preparedness against similar outages. This follows a global incident in July…

Read MoreUK Banks Advised to Prepare for Potential CrowdStrike-Style Outage

Cybersecurity Updates: Data Breaches, Vulnerabilities, and Attack Insights

Weekly Cybersecurity Newsletter: Key Developments and Insights In the latest edition of our cybersecurity newsletter, we delve into pressing updates from the digital security landscape, highlighting significant vulnerabilities and emerging threats that demand the attention of business owners and professionals alike. This week’s discussion covers the types of cyber threats…

Read MoreCybersecurity Updates: Data Breaches, Vulnerabilities, and Attack Insights

Popular Android Apps, Including Xiaomi and WPS Office, Exposed to File Overwrite Vulnerability

Several widely-used Android applications on the Google Play Store have been identified as vulnerable due to a path traversal vulnerability known as the “Dirty Stream” attack. This flaw could enable malicious applications to overwrite files within the affected apps’ home directories. According to Dimitrios Valsamaras from the Microsoft Threat Intelligence…

Read MorePopular Android Apps, Including Xiaomi and WPS Office, Exposed to File Overwrite Vulnerability