Remove tag
article thumbnail

Email Security Flaw Found in the Wild

Schneier on Security

TAG has observed four different groups exploiting the same bug to steal email data, user credentials, and authentication tokens. To ensure protection against these types of exploits, TAG urges users and organizations to keep software fully up-to-date and apply security updates as soon as they become available.

article thumbnail

Zimbra urges customers to manually fix actively exploited zero-day reported by Google TAG

Security Affairs

.” The vulnerability is reflected Cross-Site Scripting (XSS) that was discovered by ClĂ©ment Lecigne of Google Threat Analysis Group (TAG). Google TAG researchers focus on identifying and countering advanced and persistent threats. Thank you to @Zimbra for publishing this advisory and mitigation advice!

Hacking 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adding Security Keys to Your Authentication Toolbox

SecureWorld News

A quick intro to security keys: A security key can work in place of other forms of two-factor authentication such as receiving a code through SMS or pressing a button in an authentication app. When it came to authenticating, both keys worked just fine. For me personally, I'll suffer the higher price tag for the YubiKey 5.

article thumbnail

Zimbra zero-day exploited to steal government emails by four groups

Security Affairs

Google TAG revealed that threat actors exploited a Zimbra Collaboration Suite zero-day ( CVE-2023-37580 ) to steal emails from governments. Google TAG researcher ClĂ©ment Lecigne discovered the zero-day in June while investigating targeted attacks against Zimbra’s email server. ” reads the advisory published by Google TAG.

article thumbnail

New technique can defeat voice authentication "after only six tries"

Malwarebytes

Voice authentication is back in the news with another tale of how easy it might be to compromise. Voice authentication is becoming increasingly popular for crucial services we make use of on a daily basis. The absolute last thing we want to see is easily crackable voice authentication, and yet that’s exactly what we have seen.

article thumbnail

Zero-Day Flaw in Zimbra Email Software Exploited by Four Hacker Groups

The Hacker News

A zero-day flaw in the Zimbra Collaboration email software was exploited by four different groups in real-world attacks to pilfer email data, user credentials, and authentication tokens. The flaw, tracked as CVE-2023-37580 (CVSS score:

Software 107
article thumbnail

Message Authentication Code (MAC) Using Java

Veracode Security

s start by looking at applications designed around symmetric cryptography, starting with Message Authentication Code in this post. In a lot of applications (think of any kind of secure communication), receiving parties need to be assured of the origin of the message (authenticity) and make sure the message is received untampered (integrity).