article thumbnail

New VPN Risk Report by Zscaler Uncovers Hidden Security Risks Impacting Enterprises

CyberSecurity Insiders

2021 Research Highlights Growing Security Vulnerabilities Around Targeted Social Engineering, Ransomware and Malware Attacks. To download the full study, see the Zscaler 2021 VPN Risk Report. For the last three decades, VPNs have been deployed to provide remote users with access to resources on corporate networks.

VPN 125
article thumbnail

A Closer Look at the LAPSUS$ Data Extortion Group

Krebs on Security

22, Microsoft said it interrupted the LAPSUS$ group’s source code download before it could finish, and that it was able to do so because LAPSUS$ publicly discussed their illicit access on their Telegram channel before the download could complete. In a blog post published Mar.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3CX Breach Was a Double Supply Chain Compromise

Krebs on Security

In late March 2023, 3CX disclosed that its desktop applications for both Windows and macOS were compromised with malicious code that gave attackers the ability to download and run code on all machines where the app was installed. Microsoft Corp.

Malware 290
article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Krebs on Security

In most cases, this involved social engineering employees at the targeted firm into adding one of their computers or mobiles to the list of devices allowed to authenticate with the company’s virtual private network (VPN). White showing a screenshot of a script that he said downloaded all available T-Mobile source code.

Mobile 357
article thumbnail

Ransomware Groups Look for Inside Help

eSecurity Planet

“Historically, ransomware has been delivered via email attachments or, more recently, using direct network access obtained through things like unsecure VPN accounts for software vulnerabilities,” Crane Hassold, director of threat intelligence at Abnormal Security, wrote in a blog post. But this is just the start.”.

article thumbnail

Zoom Security Issues Are a Wakeup Call for Enterprises

eSecurity Planet

A little more than a week later, cybersecurity firm Armorblox outlined an account takeover attack that leveraged malicious phishing and social engineering. Instead, its wide-ranging use by enterprises convinced threat actors to use emails with spoofed addresses to entice victims to unknowingly download a malicious payload.

article thumbnail

YouTube creators’ accounts hijacked with cookie-stealing malware

Security Affairs

a demo for anti-virus software, VPN, music players, photo editing or online games) to hijack the channel of YouTube creators. The malware landing page is disguised as a software download URL that was sent via email or a PDF on Google Drive, or via Google documents containing the phishing links.