Remove tag
article thumbnail

Email Security Flaw Found in the Wild

Schneier on Security

TAG has observed four different groups exploiting the same bug to steal email data, user credentials, and authentication tokens. To ensure protection against these types of exploits, TAG urges users and organizations to keep software fully up-to-date and apply security updates as soon as they become available.

article thumbnail

Zimbra urges customers to manually fix actively exploited zero-day reported by Google TAG

Security Affairs

.” The vulnerability is reflected Cross-Site Scripting (XSS) that was discovered by ClĂ©ment Lecigne of Google Threat Analysis Group (TAG). Google TAG researchers focus on identifying and countering advanced and persistent threats. Thank you to @Zimbra for publishing this advisory and mitigation advice!

Hacking 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adding Security Keys to Your Authentication Toolbox

SecureWorld News

A quick intro to security keys: A security key can work in place of other forms of two-factor authentication such as receiving a code through SMS or pressing a button in an authentication app. When it came to authenticating, both keys worked just fine. For me personally, I'll suffer the higher price tag for the YubiKey 5.

article thumbnail

Zimbra zero-day exploited to steal government emails by four groups

Security Affairs

Google TAG revealed that threat actors exploited a Zimbra Collaboration Suite zero-day ( CVE-2023-37580 ) to steal emails from governments. Google TAG researcher ClĂ©ment Lecigne discovered the zero-day in June while investigating targeted attacks against Zimbra’s email server. ” reads the advisory published by Google TAG.

article thumbnail

New technique can defeat voice authentication "after only six tries"

Malwarebytes

Voice authentication is back in the news with another tale of how easy it might be to compromise. Voice authentication is becoming increasingly popular for crucial services we make use of on a daily basis. The absolute last thing we want to see is easily crackable voice authentication, and yet that’s exactly what we have seen.

article thumbnail

Zero-Day Flaw in Zimbra Email Software Exploited by Four Hacker Groups

The Hacker News

A zero-day flaw in the Zimbra Collaboration email software was exploited by four different groups in real-world attacks to pilfer email data, user credentials, and authentication tokens. The flaw, tracked as CVE-2023-37580 (CVSS score:

Software 111
article thumbnail

Dell notifies customers about data breach

Malwarebytes

Enable two-factor authentication (2FA). Some forms of two-factor authentication (2FA) can be phished just as easily as a password. The information involved does not include financial or payment information, email address, telephone number or any highly sensitive customer information.”