News & Updates

Microsoft patches 3 vulnerabilities in Azure API Management

Microsoft has patched three new vulnerabilities in the Azure API Management service which includes two Server-Side Request Forgery (SSRF) vulnerabilities and a file upload path traversal on an internal Azure workload, according to cybersecurity firm Ermetic.

The vulnerabilities were achieved through url formatting bypasses and an unrestricted file upload functionality in the API Management developer portal, Ermetic said. The cybersecurity firm identified the vulnerabilities in December and Microsoft patched them in January.

To read this article in full, please click here

News & Updates

North Korea-linked Kimsuky APT uses new recon tool ReconShark

North Korea-linked APT group Kimsuky has been observed using a new reconnaissance tool dubbed ReconShark in a recent campaign. SentinelOne researchers observed an ongoing campaign from North Korea-linked Kimsuky Group that is using a new malware called ReconShark. The reconnaissance tool is delivered through spear-phishing emails, OneDrive links leading to document weaponized downloads, and the execution of malicious […]

The post North Korea-linked Kimsuky APT uses new recon tool ReconShark appeared first on Security Affairs.

Cybersecurity Tools

Royal Ransomware Targets the City of Dallas in Ransomware Attack

Officials from Dallas, Texas declared that Royal Ransomware gang is responsible for a cyberattack that shut down most of the city’s services and knocked the Dallas Police and Fire Rescue departments offline this week. Since the ransomware group’s Wednesday morning intrusion into network servers was discovered by Dallas’ IT workers, which resulted in a system-wide […]

The post Royal Ransomware Targets the City of Dallas in Ransomware Attack appeared first on Heimdal Security Blog.

Cybersecurity Tools

Identity and Access Management Best Practices

Identity and Access Management is a critical component of modern-day cybersecurity. Often abbreviated as IAM, it refers to a collection of technologies, policies, and procedures that assist organizations in managing and verifying the identities of individuals and devices, granting access to data and other resources, and keeping track of who has accessed what information. Now […]

The post Identity and Access Management Best Practices appeared first on Heimdal Security Blog.

Scroll to Top