ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Hacker greifen über Microsoft-Lücke an

Threat Score:
46
CSO Online
4 days ago
Part of cluster #1317

Overview

Über eine Sicherheitslücke in SharePoint haben Hacker zahlreiche Behörden und Unternehmen angegriffen. T. Schneider – Shutterstock.com IT-Sicherheitsexperten schlagen Alarm, weil Behörden und Unternehmen über eine neu entdeckte Schwachstelle in Software von Microsoft angegriffen werden. Betroffen sind demnach lokale Server für das Programm SharePoint zum Teilen von Dateien. Über die Schwachstelle seien Angreifer bereits in Systeme “Dutzender” Organisationen eingedrungen, sowohl in der Wirtschaft...

Continue Reading on Original Site

Related Articles

5 articles
1

Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials

Cybersecurity News • 3 hours ago

Attackers are weaponizing India’s appetite for mobile banking by circulating counterfeit Android apps that mimic the interfaces and icons of public-sector and private banks. Surfacing in telemetry logs on 3 April 2025, the impostors travel through smishing texts, QR codes and -engine poisoning, tricking users into sideloading the packages. During the initial execution window, a […]

Score
83
Read more
2

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

The Hacker News • 2 hours ago

Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners. The threat activity clusters have been codenamedSoco404andKoskeby cloud security firms Wiz and Aqua, respectively. Soco404 "targets both Linux and Windows systems, deploying platform-specific malware," Wiz researchers Maor Dokhanian, Shahar Dorfman, and Avigayil Mechtingersaid. "They use process masquerading to disguise

Score
82
Read more
3

Mitel Patches Critical Flaw in Enterprise Communication Platform

SecurityWeek • 45 minutes ago

An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.

Score
81
Read more
4

Phishing Attack Spoofs Facebook Login Page to Capture Credentials

GB Hackers • 1 hour ago

Phishing Attack Spoofs Login Page to Capture Credentials Cybercriminals are using a variety of dishonest tactics in a sophisticated phishing effort aimed at users in order to obtain login information. The attack begins with a malicious redirect that leads victims to a fraudulent website mimicking legitimate interfaces. Here, users encounter a fake CAPTCHA prompt designed to appear as a standard security verification step. Upon interacting with this prompt, the site deploys a Browser-in-the-Brows

Score
81
Read more
5

Sophisticated Koske Linux Malware Developed With AI Aid

SecurityWeek • 1 hour ago

The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.

Score
80
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

DOMAINS
Shutterstock.com
FILE PATH
/jm)
AGENCIES
CISA
COMPANIES
Microsoft
PLATFORMS
SharePoint
SECURITY VENDORS
CrowdStrike
Palo Alto Networks
DOMAINS
Shutterstock.com
ARTICLE INFORMATION
Article #3913
Published 4 days ago
CSO Online