#credential-compromise

[ follow ]
#cyberattack
Information security
fromSecurityWeek
1 day ago

Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach

Stryker cyberattack involved compromised administrator credentials obtained through infostealer malware, enabling attackers to abuse Microsoft Intune for device wiping.
Privacy professionals
fromTechCrunch
2 days ago

Stryker says it's restoring systems after pro-Iran hackers wiped thousands of employee devices | TechCrunch

Pro-Iranian hackers breached Stryker's network via compromised administrator credentials, remotely wiping tens of thousands of employee devices through Microsoft InTune access in retaliation for U.S. military actions.
Information security
fromSecurityWeek
1 day ago

Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach

Stryker cyberattack involved compromised administrator credentials obtained through infostealer malware, enabling attackers to abuse Microsoft Intune for device wiping.
Privacy professionals
fromTechCrunch
2 days ago

Stryker says it's restoring systems after pro-Iran hackers wiped thousands of employee devices | TechCrunch

Pro-Iranian hackers breached Stryker's network via compromised administrator credentials, remotely wiping tens of thousands of employee devices through Microsoft InTune access in retaliation for U.S. military actions.
fromSecuritymagazine
4 days ago

Targeted Phishing Attack Breaches Biotech Company Data

This phishing attack enabled the threat actor to access 'certain internal IT business applications.' The malicious actor gained unauthorized entry by compromising an employee's access to the organization's internal network for business administration.
Information security
Information security
fromThe Hacker News
1 week ago

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

Modern phishing campaigns exploit trusted infrastructure and encrypted traffic, requiring SOCs to scale detection capabilities to prevent credential theft and operational disruption before attackers gain authenticated access.
Information security
fromThe Hacker News
2 weeks ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromTheregister
2 weeks ago

Dev stunned by $82K Gemini API key bill after theft

A developer's stolen Google Gemini API key resulted in $82,314 in unauthorized charges within 48 hours, while Google refused to waive costs citing shared responsibility, threatening the startup's survival.
Information security
fromTheregister
2 weeks ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
Information security
fromThe Hacker News
3 weeks ago

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking financially motivated actor used commercial generative AI to compromise 600+ FortiGate devices in 55 countries by exploiting exposed management ports and weak credentials.
fromThe Hacker News
4 months ago

Enterprise Credentials at Risk - Same Old, Same Old?

Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization's cloud provider. She clicks the link, types in her credentials, and goes back to her spreadsheet. But unknown to her, she's just made a big mistake. Sarah just accidentally handed over her login details to cybercriminals who are laughing all the way to their dark web marketplace, where they'll sell her credentials for about $15. Not much as a one-off, but a serious money-making operation when scaled up.
Information security
Information security
fromComputerworld
4 months ago

Nikkei's Slack breach leaks sensitive data from more than 17,000 users

Compromised employee authentication and use of personal devices for Slack access exposed Nikkei to attackers, revealing weak IT/IS risk management and credential protection.
fromTheregister
6 months ago

How big a Drift? Cloudflare cops to Salesloft Drift breach

Because of this breach, someone outside Cloudflare got access to our Salesforce instance, which we use for customer support and internal customer case management, and some of the data it contains,
Information security
[ Load more ]