How attackers exploit Microsoft 365 from the inside – and what to do about it – Go Health Pro

How attackers exploit Microsoft 365 from the inside – and what to do about it – Go Health Pro

COMMENTARY: The shift to cloud-based email has been a game changer for organizations worldwide, with Microsoft 365 (M365) emerging as a dominant platform for business communication.However, this widespread adoption has also made M365 an attractive target for cybercriminals, who now leverage the platform itself to launch highly-deceptive attacks. Unlike traditional phishing schemes that rely on … Read more

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability – Go Health Pro

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability – Go Health Pro

Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by … Read more

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility – Go Health Pro

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility – Go Health Pro

Mar 21, 2025Ravie LakshmananCyber Attack / Vulnerability Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center. The two critical-rated vulnerabilities in question are listed below – CVE-2024-20439 (CVSS score: 9.8) – The presence of an undocumented static user credential for an administrative account that … Read more

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes – Go Health Pro

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes – Go Health Pro

Feb 19, 2025Ravie LakshmananMobile Security / Cyber Espionage Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. “The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app’s legitimate ‘linked devices’ … Read more

Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks – Go Health Pro

Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks – Go Health Pro

Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024 to break into organizations across Europe, North America, Africa, and the Middle East. The Russian group, known as Storm-2372, has targeted government and non-governmental organisations (NGOs), as well as firms working in IT, defence, telecoms, … Read more