News

CSO Online
csoonline. com > article > 4160853 > hackers-exploit-vercels-trust-in-ai-integration. html

Hackers exploit Vercel's trust in AI integration

2+ hour, 8+ min ago  (586+ words) Frontend cloud platform Vercel, the creator of Next. js and Turbo. js, has warned about a data breach after a compromised third-party AI application abused OAuth to access its internal systems. A Vercel employee used the third party app, identified…...

CSO Online
csoonline. com > article > 4160858 > attackers-abuse-microsoft-teams-to-impersonate-the-it-helpdesk-in-a-new-enterprise-intrusion-playbook. html

Attackers abuse Microsoft Teams to impersonate the IT helpdesk in a new enterprise intrusion playbook

2+ hour, 7+ min ago  (811+ words) Attackers are increasingly exploiting enterprise collaboration platforms such as Microsoft Teams to gain initial access, impersonating IT helpdesk staff and persuading employees to grant remote control, according to new research from Microsoft. In a blog post, Microsoft described a "cross-tenant…...

CSO Online
csoonline. com > article > 4160754 > claude-mythos-ist-der-hype-gerechtfertigt. html

Claude Mythos " ist der Hype gerechtfertigt?

5+ hour, 10+ min ago  (482+ words) Shweta has been writing about enterprise technology since 2017, most recently reporting on cybersecurity for CSO online. She breaks down complex topics from ransomware to zero trust architecture for both experts and everyday readers. She has a postgraduate diploma in journalism…...

CSO Online
csoonline. com > article > 4160426 > copilot-agentforce-offen-fur-prompt-injection-tricks. html

Copilot & Agentforce offen f'r Prompt-Injection-Tricks

3+ day, 3+ min ago  (490+ words) Shweta has been writing about enterprise technology since 2017, most recently reporting on cybersecurity for CSO online. She breaks down complex topics from ransomware to zero trust architecture for both experts and everyday readers. She has a postgraduate diploma in journalism…...

CSO Online
csoonline. com > article > 4159317 > cisos-reshape-their-roles-as-business-risk-strategists. html

CISOs reshape their roles as business risk strategists

4+ day, 5+ hour ago  (1025+ words) Nitin Raina's career history resembles that of many CISOs: He worked in IT infrastructure, operations, and services before moving into security and advancing through the ranks. He's now global chief information security officer at technology consultancy Thoughtworks. But in a…...

CSO Online
csoonline. com > article > 4127334 > the-silent-security-gap-in-enterprise-ai-adoption. html

The silent security gap in enterprise AI adoption

2+ mon, 2+ week ago  (935+ words) Most security leaders believe they know where their sensitive data lives and how it is protected. That confidence is increasingly misplaced. This shift has happened quickly. In many organizations, AI systems have moved from pilot projects to core infrastructure in…...

CSO Online
csoonline. com > article > 4151363 > european-commission-data-stolen-in-a-cyberattack-on-the-infrastructure-hosting-its-web-sites. html

European Commission data stolen in a cyberattack on the infrastructure hosting its web sites

3+ week, 3+ day ago  (501+ words) The European Commission is continuing to investigate the theft of data from its cloud infrastructure earlier this week. On Thursday, the Commission revealed there had been an attack on its Europa. eu platform, offering few details, then, on Friday, security…...

CSO Online
csoonline. com > article > 4137834 > china-linked-hackers-used-google-sheets-to-spy-on-telecoms-and-governments-across-42-countries. html

China-linked hackers used Google Sheets to spy on telecoms and governments across 42 countries

1+ mon, 3+ week ago  (676+ words) Google has disrupted a China-linked espionage group that used Google's spreadsheet application as a covert spy tool to compromise telecom providers and government agencies across 42 countries, sending commands and receiving stolen data through it, Google's Threat Intelligence Group (GTIG) said…...

CSO Online
csoonline. com > article > 4003545 > chrome-extension-privacy-promises-undone-by-hardcoded-secrets-leaky-http. html

Chrome extension privacy promises undone by hardcoded secrets, leaky HTTP

2+ day, 15+ hour ago  (335+ words) Seemingly harmless Chrome extensions aimed at improving browser privacy and analytics could be inadvertently leaking API keys, secrets, and other sensitive machine information." According to a Symantec research, several widely used Chrome extensions, including Dual Safe Password Manager and Avast…...

CSO Online
csoonline. com > article > 4119047 > crashfix-attack-hijacks-browser-failures-to-deliver-modelrat-malware-via-fake-chrome-extension. html

Crash Fix attack hijacks browser failures to deliver Model RAT malware via fake Chrome extension

3+ mon, 23+ hour ago  (344+ words) Once the browser becomes unusable, victims are presented with a fake "repair" prompt instructing them to paste and execute a command to resolve the issue. According to Huntress" analysis, the malicious extension does not immediately perform malicious actions. Instead, it…...