article thumbnail

Yandex security team caught admin selling access to users’ inboxes

Security Affairs

Russian internet and search company Yandex discloses a data breach, a system administrator was selling access to thousands of user mailboxes. “An internal investigation revealed that an employee had been providing unauthorized access to users’ mailboxes for personal gain. ” concludes the company.

Access 131
article thumbnail

Possible Chinese Hackers Exploit Microsoft Exchange 0-Days

Data Breach Today

No Patch Yet Available Although Exploitation Requires Authenticated Access Hackers, possibly Chinese, are exploiting Microsoft Exchange zero-day vulnerabilities to apparently implant backdoors and steal credentials. The computing giant says it doesn't yet have a patch, telling systems administrators to instead implement workarounds.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Krebs on Security

The attackers exploited a vulnerability in software from Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. Sanders said the portal had been retired in 2018 in favor of a more modern customer support and ticketing system, yet somehow the old site was still left available online.

IT 292
article thumbnail

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

As digital transformation kicks into high gear, it’s certainly not getting any easier to operate IT systems securely, especially for small- and medium-sized businesses. In fact, sophisticated identity and access management , or IAM, solutions, of which PAM is a subset, came along to help companies improve their data governance.

Access 195
article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

Each private key serves a narrow function: it gives the same type of authenticity and level of access to each user. All the attacker needs to do, he says, is to take over the account of a legitimate user to attain deep access to a lot of sensitive information stored in the cloud. Attribute-based access. megabytes of fresh data.

article thumbnail

Microsoft Patch Tuesday, June 2023 Edition

Krebs on Security

today released software updates to fix dozens of security vulnerabilities in its Windows operating systems and other software. “An attacker able to gain admin access to an internal SharePoint server could do a lot of harm to an organization,” said Kevin Breen , director of cyber threat research at Immersive Labs.

article thumbnail

FBI and CISA published a new advisory on AvosLocker ransomware

Security Affairs

The AvosLocker ransomware-as-a-service emerged in the threat landscape in September 2021, since January the group expanded its targets by implementing support for encrypting Linux systems, specifically VMware ESXi servers. Threat actors were also observed uploading and use custom webshells to enable network access [T1505.003].