News & Updates

Inactive, unmaintained Salesforce sites vulnerable to threat actors

Improperly deactivated and unmaintained Salesforce sites are vulnerable to threat actors who can gain access to sensitive business data and personally identifiable information (PII) by simply changing the host header. That’s according to new research from Varonis Threat Labs, which explores the threats posed by Salesforce “ghost sites” that are no longer needed, set aside, but not deactivated. These sites are typically not maintained or tested against vulnerabilities, while admins fail to update security measures according to newer guidelines. However, they can still pull fresh data and are easily exploitable by malicious actors, the researchers said.

To read this article in full, please click here

News & Updates

Beware of Ghost Sites: Silent Threat Lurking in Your Salesforce Communities

Improperly deactivated and abandoned Salesforce Sites and Communities (aka Experience Cloud) could pose severe risks to organizations, leading to unauthorized access to sensitive data.
Data security firm Varonis dubbed the abandoned, unprotected, and unmonitored resources “ghost sites.”
“When these Communities are no longer needed, though, they are often set aside but not deactivated,” Varonis
News & Updates

SAS Airlines hit by $3 million ransom demand following DDoS attacks

Scandinavian Airlines (SAS) has received a US $3 million ransom demand following
a prolonged campaign of distributed denial-of-service (DDoS) attacks against its
online services.

As Cybernews reports
[https://cybernews.com/security/sas-3m-ransom-demand-anonymous-sudan-ongoing-attack/]
, the Anonymous Sudan hacktivist group published their financial demand on its
Telegram channel after disrupting the airline’s website and smartphone app.

In a post on its encrypted channel, Anonymous Sudan said

News & Updates

Threat actors are exploiting Barracuda Email Security Gateway bug since October 2022

Recently disclosed zero-day flaw in Barracusa Email Security Gateway (ESG) appliances had been actively exploited by attackers since October 2022. The network security solutions provider Barracuda recently warned customers that some of its Email Security Gateway (ESG) appliances were recently breached by threat actors exploiting a now-patched zero-day vulnerability. The vulnerability, tracked as CVE-2023-2868, resides […]

The post Threat actors are exploiting Barracuda Email Security Gateway bug since October 2022 appeared first on Security Affairs.

Cybersecurity Tools

Warning! WordPress Plugin ”Gravity Forms” Vulnerable to PHP Object Injection

Researchers revealed that the largely used WordPress plugin ”Gravity Forms” is vulnerable to unauthenticated PHP Object Injection. The flaw was tracked as CVE-2023-28782 and affects all plugin versions from 2.73 and below. The vendor fixed the vulnerability with the release of version 2.7.4, available for users starting April 11th, 2023. Cybersecurity specialists urge website admins […]

The post Warning! WordPress Plugin ”Gravity Forms” Vulnerable to PHP Object Injection appeared first on Heimdal Security Blog.

News & Updates

Critical Firmware Backdoor in Gigabyte Systems Exposes ~7 Million Devices

Cybersecurity researchers have found “backdoor-like behavior” within Gigabyte systems, which they say enables the UEFI firmware of the devices to drop a Windows executable and retrieve updates in an unsecure format.
Firmware security firm Eclypsium said it first detected the anomaly in April 2023. Gigabyte has since acknowledged and addressed the issue.
“Most Gigabyte firmware includes a Windows
News & Updates

Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass

Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root access to bypass security enforcements and perform arbitrary actions on affected devices.
Specifically, the flaw – dubbed Migraine and tracked as CVE-2023-32369 – could be abused to get around a key security measure called System Integrity Protection (SIP), or “rootless,” which
News & Updates

6 Steps to Effective Threat Hunting: Safeguard Critical Assets and Fight Cybercrime

Finding threat actors before they find you is key to beefing up your cyber defenses. How to do that efficiently and effectively is no small task – but with a small investment of time, you can master threat hunting and save your organization millions of dollars.
Consider this staggering statistic. Cybersecurity Ventures estimates that cybercrime will take a $10.5 trillion toll on the global
Exit mobile version