Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Phishing Attacks Abuse Microsoft 365 to Bypass Security Filters

Threat actors are abusing Microsoft’s infrastructure to launch phishing attacks that can bypass security measures, according to researchers at Guardz. The attackers compromise multiple Microsoft 365 tenants in order to generate legitimate transaction notifications that contain phishing messages.

Vivek Ramachandran to Speak at Black Hat Asia's 2025 Financial Services Summit on the Evolving Cyber War Against State Actors

PALO ALTO, Calif., - 19 March 2025 - Vivek Ramachandran, Founder of SquareX and a cybersecurity veteran with over two decades of experience, will speak at the Black Hat Asia Financial Services Summit on April 2 2025 at Marina Bay Sands, Singapore. His talk, The War Against State Actors: Bleeding Edge Techniques Targeting Financial Services, will examine how nation-state attackers are evolving their tactics to infiltrate financial institutions and bypass enterprise security controls.

Optimising Supply Chain Cyber Security is Critical to the UK Healthcare and Pharmaceutical Sector

The potential impact on the UK healthcare and pharmaceutical industry from cyber-attacks is front-of-mind for a number of key reasons, including how critical these industries are to everyday life. First, the Intellectual Property (IP) at the operational epicentre of these businesses - collectively worth hundreds of billions in R&D investment annually - makes the pharmaceutical industry an increasingly attractive target for cyber threat actors.

AS-REP Roasting Attack Explained | Real-Life Active Directory Exploit Demo

What is AS-REP Roasting? AS-REP Roasting is an attack that exploits misconfigured Active Directory accounts with disabled Kerberos pre-authentication. Attackers can retrieve password hashes and crack them with minimal effort, leading to unauthorized access. Watch This Real-World Attack Demo Jon Obst, Director of Research at Netwrix, demonstrates: How to Prevent AS-REP Roasting Protect your organization with proactive security controls.

How Attackers Use AI To Spread Malware On GitHub

Github Copilot became the subject of critical security concerns, mainly because of jailbreak vulnerabilities that allow attackers to modify the tool’s behavior. Two attack vectors – Affirmation Jailbreak and Proxy Hijack – lead to malicious code generation and unauthorized access to premium AI models. But that’s not all. Contents hide 1 Jailbreaking GitHub Copilot 1.1 Affirmation jailbreak? “Sure,” let’s exploit the AI system(s) 2 Proxy Hijack.

DNS is the center of the modern attack surface - are you protecting all levels?

If you are a mature organization, you might manage an external IP block of 65,000 IP addresses (equivalent to a /16 network). In contrast, very large organizations like Apple may handle an astonishing 16.7 million IP addresses or more (about a /8 network). However, this isn’t the case for many of us. IP addresses are fixed assets and can be costly, so most modern organizations do not have a large number of directly assigned IP addresses for every service they expose to the internet.

European Cyber Report 2025: 137% more DDoS attacks than last year - what companies need to know

Cyberattacks are no longer an abstract threat - they dominate risk planning for companies worldwide. The latest Link11 European Cyber Report shows an alarming trend: the number of DDoS attacks has more than doubled, and they are shorter, more targeted, and more technically sophisticated. Organizations that do not continuously evolve their security strategies face significant financial losses and long-term reputational damage.

Get the TL;DR: tj-actions/changed-files Supply Chain Attack

The tj-actions/changed-files GitHub Action, which is currently used in over 23,000 repositories, has been compromised, leaking secrets through workflow logs and impacting thousands of CI pipelines. All tagged versions were modified, making tag-based pinning unsafe. Public repositories are at the highest risk, but private repos should also verify their exposure.

Detecting and Mitigating the "tj-actions/changed-files" Supply Chain Attack (CVE-2025-30066)

On March 14, 2025, StepSecurity uncovered a compromise in the popular GitHub Action tj-actions/changed-files. Tens of thousands of repositories use this action to track file changes, and it is now known to have been tampered with, posing a risk to both public and private projects. A CVE has been created for this issue: CVE-2025-30066.

Massive DDoS on X: Dark Storm or Cyber Fog?

Earlier this week, users of the X (formerly Twitter) social network were either unable to access the platform or experienced service degradation somehow. On March 10, 2025, reports emerged of users worldwide being unable to log in, post, or view content. This incident was later attributed to a large-scale distributed denial-of-service (DDoS) attack targeting X's infrastructure.