Okta open-sources Auth0 rules catalog for threat detection

Picus Blue Report 2025

Okta has open-sourced ready-made Sigma-based queries for Auth0 customers to detect account takeovers, misconfigurations, and suspicious behavior in event logs. Auth0 is Okta’s identity and access management (IAM) platform used by organizations for login, authentication, and user management services. By releasingg the detection rules, the companyaims to help security teams quickly analyze Auth0 logs for … Ler mais

Microsoft shares workaround for Teams "couldn't connect" error

Picus Blue Report 2025

Microsoft is resolving a known issue that causes “couldn’t connect” errors when launching the Microsoft Teams desktop and web applications. The company states that the error is caused by a recent change to Teams’ sidebar, but has yet to disclose which regions are affected by this ongoing issue. While Microsoft has yet to share more … Ler mais

Noodlophile Stealer evolution – Security Affairs

Noodlophile Stealer evolution - Security Affairs

Noodlophile Stealer evolution Noodlophile malware spreads via copyright phishing, targeting firms in the U.S., Europe, Baltics & APAC with tailored spear-phishing lures. The Noodlophile malware campaign is expanding globally, using spear-phishing emails disguised as copyright notices. Threat actors tailor lures with details like Facebook Page IDs and company ownership data. Active for over a year, … Ler mais

Mobile Phishers direciona clientes de corretagem no esquema de caixa ‘rampa e despejo’

Mobile Phishers Target Brokerage Customers in 'Ramp and Dump' Cashout Scheme

Grupos cibercriminais especializados em kits avançados de phishing móvel desenvolveram suas operações além de roubar dados do cartão de pagamento para a inscrição em carteira móvel, agora girando para explorar contas de corretagem em esquemas sofisticados de ‘rampa e dump’. Essa mudança, conforme detalhada em pesquisas recentes de especialistas em segurança, aproveita as credenciais do … Ler mais

Public Exploit Released for Critical SAP NetWeaver Flaw

Public Exploit Released for Critical SAP NetWeaver Flaw

A critical vulnerability in SAP NetWeaver AS Java Visual Composer, tracked as CVE-2025-31324, is now being widely exploited following the release of public exploit tooling. The flaw, patched in April 2025, allows unauthenticated remote code execution via the platform’s metadata uploader endpoint. What’s new is the public availability of the full source code, which makes … Ler mais

Novo clickfix ataque implanta página de notícias BBC falsa e verificação falsa de cloudflare para enganar usuários

New ClickFix Attack Deploys Fake BBC News Page and Fake Cloudflare Verification to Deceive Users

Os pesquisadores de segurança cibernética descobriram uma nova variante de ataque de clickfix que personifica o conteúdo de notícias da BBC confiável e, ao mesmo tempo, alavancando interfaces de verificação de gornilha falsificadas Cloudflare para coagir os usuários a executar PowerShell comandos. Esta campanha, detalhada em análises recentes de fontes como News de segurança cibernética … Ler mais

Allianz Life Data Breach Exposes Personal Data of 1.1 Million

Allianz Life Data Breach Exposes Personal Data of 1.1 Million

A cyber-attack on Allianz Life in July has exposed the personal information of about 1.1 million customers, according to new data byHave I Been Pwned. The breach targeted a cloud-based customer relationship management (CRM) system and is part of a larger campaign against companies using Salesforce-hosted databases. Allianz Life, a US subsidiary of German insurer … Ler mais

Canadian Financial Regulator Hacked, Exposing Personal Data from Membe

Canadian Financial Regulator Hacked, Exposing Personal Data from Membe

A Canadian financial regulator has disclosed a cybersecurity incident, which has breached the personal information of member firms and their employees. The Canadian Investment Regulatory Organization (CIRO), a national self-regulatory organization covering all investment dealers, mutual fund dealers and trading activity on Canada’s debt and equity marketplaces, revealed it identified the cybersecurity threat on August … Ler mais

Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competi

Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competi

A threat actor has been observed “patching” a vulnerability post exploitation, likely in a bid to lock out other adversaries and secure exclusive access. The novel tactic was detected by Red Canary researchers in a cluster of activity targeting a flaw in Apache ActiveMQ, an open-source message broker, to gain persistent access on cloud-based Linux … Ler mais

Surto em varreduras da Hacked Cisco, Linksys e Araknis Routers

Surge in Scans From Hacked Cisco, Linksys, and Araknis Routers

Os pesquisadores de segurança cibernética identificaram um aumento significativo nas atividades de varredura maliciosas originárias de equipamentos de rede de consumidores e empresas comprometidas, com foco particular nos modelos Cisco, Linksys e Araknis. A ShadowsServer Foundation, uma importante organização de inteligência de ameaças, relatou observar padrões incomuns de varredura que sugerem comprometimento generalizado desses dispositivos … Ler mais