Latest security news
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted
- Palo Alto Networks Patches Series of Vulnerabilities
- Identifying high-risk APIs across thousands of code repositories
- NIST Publishes New Zero Trust Implementation Guidance
- Europol Says Criminal Demand for Data is “Skyrocketing”
- Phishing Alert as Erie Insurance Reveals Cyber “Event”
- Cybercriminals are turning stolen data into a thriving black market
- Want fewer security fires to fight? Start with threat modeling
- Build a mobile hacking rig with a Pixel and Kali NetHunter
- CISOs call for operational threat intelligence integration
- Congress Introduces Bill to Strengthen Healthcare Cybersecurity
- 20,000 Asian IPs and Domains Dismantled in Infostealer Crackdown
- Hands-On Skills Now Key to Landing Your First Cyber Role
- Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud
- Half of Mobile Users Now Face Daily Scams
- Two Microsoft Zero-Days for Admins to Fix in June Patch Tuesday
- Android Enterprise Rolls Out Security and Productivity Updates
- Mastery Schools Notifies 37,031 of Major Data Breach
Attackers are using the TeamFiltration pentesting framework to brute-force their way into Microsoft Entra ID (formerly Azure AD) accounts, Proofpoint researchers have discovered. “Proofpoint’s research indicates that while simulated intrusions using TeamFiltration date back nearly to the tool’s initial release in 2021, there has recently been a surge in login attempts associated with its use,” they shared. “This increase in activity, attributed to UNK_SneakyStrike’s ongoing campaign, began in December 2024 and peaked in January 2025. …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.