The Russia-linked threat group is harvesting credentials for Microsoft’s cloud offering, and targeting mainly election-related organizations.
Source: Threat Post – Web Security
[...]
Open source platforms such as the Malware Information Sharing Platform are well positioned to drive a community-based approach to intelligence sharing.
Source:
[...]
IBM Spectrum Scale CVE-2018-1723 Information Disclosure Vulnerability
Source: Security Focus – Vuln: IBM Spectrum Scale CVE-2018-1723 Information Disclosure Vulnerability
[...]
Attackers are increasingly targeting insecure legacy protocols, like IMAP, to avoid running into multi-factor authentication in password-spraying campaigns.
Source: Threat Post –
[...]
A new Amnesty International report explains how cyberattackers are phishing second-factor authentication codes sent via SMS.
Source: Dark Reading – Threat Intelligence
[...]