Tag: software
-
Workday Confirms Data Breach Tied to Salesforce Attacks
A New Corporate Victim in a Broader CRM Exploitation Campaign Workday, one of the world’s leading human capital management (HCM) software providers, has confirmed it was impacted in a recent string of coordinated cyberattacks targeting Salesforce CRM instances through sophisticated social engineering. While the company says no customer tenants or internal systems were compromised, attackers……
-
Lack of Developer Training Fuels Cyber Breaches Across UK Organisations
A new survey from SecureFlag has revealed serious shortcomings in how UK businesses protect themselves from software-related threats. In a poll of 100 C-suite and technology leaders, 67% admitted their organisation had suffered at least one cybersecurity breach or major incident in the past 12 months due to insecure coding practices, with nearly half experiencing…
-
Secure Software Development Why It Matters
Secure Software Development Why It Matters to Every UK SMB (Even If You Don’t Write Code) When most small and medium-sized businesses (SMBs) hear “secure development,” they think: “That doesn’t apply to us, we don’t build apps or write code.” But that’s a dangerous misconception. In today’s interconnected digital ecosystem, secure software development isn’t… First…
-
Workday Latest Company Hit by Third-Party CRM Platform Breach
Workday, a high-profile HR and finance software solutions maker, is the latest victim of a string of data breaches orchestrated by the resurgent ShinyHunters threat group through Salesforce’s CRM solution, joining a lineup of targets that includes Google, Qantas, Pandora, and Adidas. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/08/workday-latest-company-hit-by-third-party-crm-platform-breach/
-
New NIST guide explains how to detect morphed images
Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks at buildings, airports, borders, and other secure … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/18/nist-guide-detect-morphed-images/
-
Workday Breached as Ransomware Group Seeks Salesforce Data
CRM Breach May Be Tied to Ongoing Scattered Spider and ShinyHunters Campaign. Cloud software giant Workday said its customer relationship management software has been breached and customer data stolen. The alert comes as attackers continue to pose as employees to trick help desks into giving them direct access to a victim’s Salesforce CRM instance. First…
-
UK’s Colt hit by cyberattack, support systems offline amid ransom threat
Tags: api, attack, china, communications, cve, cyberattack, data, data-breach, exploit, finance, flaw, group, infrastructure, Internet, microsoft, network, programming, ransom, rce, remote-code-execution, russia, service, software, threat, update, vulnerabilitywith samples on a Russian Tor site.”We’ve seen already this year that telecom is particularly vulnerable to attacks, and I think this WarLock attack highlights some recurring issues that telecom and large-scale network service providers are starting to see,” said Gabrielle Hempel, Security Operations Strategist at Exabeam. “There’s this operational ripple effect when you’re a…
-
1235 wöchentliche Attacken auf deutsche Organisationen
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies, hat seinen für Juli 2025 veröffentlicht. Im Juli waren Unternehmen im globalen Vergleich durchschnittlich 2011 Cyber-Angriffen pro Woche ausgesetzt. Das ist ein Anstieg von drei Prozent gegenüber dem Vormonat und zehn Prozent gegenüber dem Vorjahr. In Deutschland ist die Zahl […] First seen on…
-
Human resources firm Workday disclosed a data breach
Human resources firm Workday disclosed a data breach after attackers accessed a third-party CRM platform via social engineering. Workday is a cloud-based software company that specializes in enterprise applications for human capital management (HCM), financial management, and planning. The company provides services to over 11,000 organizations, including over 60% of Fortune 500 firms. The HR…
-
Agentic AI promises a cybersecurity revolution, with asterisks
Tags: ai, api, authentication, ceo, ciso, cloud, control, cybersecurity, data, endpoint, infrastructure, jobs, LLM, open-source, openai, risk, service, soc, software, supply-chain, technology, tool, update, vulnerabilityTrust, transparency, and moving slowly are crucial: Like all technologies, and perhaps more dramatically than most, agentic AI carries both risks and benefits. One obvious risk of AI agents is that, like most LLM models, they will hallucinate or make errors that could cause problems.”If you want to remove or give agency to a platform…
-
KI-Agenten gegen Schwachstellen in KI-Code – Tricentis erweitert KI-Funktionen zur Software-Qualitätssicherung
First seen on security-insider.de Jump to article: www.security-insider.de/tricentis-erweitert-ki-funktionen-zur-software-qualitaetssicherung-a-df256beaaf49f00269efa95fe44d0a7c/
-
SAP Security Patch Day Fixes 15 Flaws, Including 3 Injection Vulnerabilities
SAP released critical security updates on August 12, 2025, addressing 15 vulnerabilities across its enterprise software portfolio, with three severe code injection flaws receiving the highest CVSS scores of 9.9. The monthly Security Patch Day also included four updates to previously released security notes, highlighting the company’s ongoing commitment to protecting customer environments against evolving…
-
5 key takeaways from Black Hat USA 2025
Tags: access, api, attack, authentication, botnet, business, cisco, cloud, container, control, credentials, data, endpoint, exploit, firmware, flaw, framework, Hardware, iam, login, malicious, malware, network, password, programming, rce, remote-code-execution, service, software, technology, tool, update, usa, vulnerability, windowsVaults can be cracked open: Critical vulnerabilities in popular enterprise credential vaults were unveiled by security researchers from Cyata during Black Hat.The flaws in various components of HashiCorp Vault and CyberArk Conjur, responsibly disclosed to the vendors and patched before their disclosure, stemmed from subtle logic flaws in authentication, validation, and policy enforcement mechanisms, as…
-
Two groups exploit WinRAR flaws in separate cyber-espionage campaigns
A prominent hacking operation known as RomCom and a lesser-known group tracked as Paper Werewolf or Goffee each exploited a zero-day vulnerability in WinRAR software this summer, researchers said. First seen on therecord.media Jump to article: therecord.media/winrar-zero-day-exploited-romcom-paper-werewolf-goffee-hackers
-
How ShinyHunters Hacking Group Stole Customer Data from Salesforce
Hackers posed as Salesforce IT staff, using vishing to trick employees into installing malicious software for data theft and extortion. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-salesforce-vishing-attack-shinyhunters/
-
Microsoft tests cloud-based Windows 365 disaster recovery PCs
Microsoft has announced the limited public preview of Windows 365 Reserve, a service that provides temporary desktop access to pre-configured cloud PCs for employees whose computers have become unavailable due to cyberattacks, hardware issues, or software problems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-tests-cloud-based-windows-365-disaster-recovery-pcs/
-
Sicherheits-News: Datenlecks (Google, Telekom); Schwachstellen (WinRAR, Windows) und mehr
Noch ein kleiner Sammelbeitrag zu Sicherheitsthemen. Es gibt mal wieder Datenlecks, bei Google, bei der Telekom etc. Die Software WinRAR enthält eine Schwachstelle, über die Schadsoftware ausgeliefert wird. Und Domain Controller mit Windows können in ein DDoS-Werkzeug verwandelt werden, die … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/11/sicherheits-news-datenlecks-google-telekom-schwachstellen-winrar-windows-und-mehr/
-
âš¡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More
This week, cyber attackers are moving quickly, and businesses need to stay alert. They’re finding new weaknesses in popular software and coming up with clever ways to get around security. Even one unpatched flaw could let attackers in, leading to data theft or even taking control of your systems. The clock is ticking”, if defenses…
-
CSO hiring on the rise: How to land a top security exec role
Tags: access, ai, attack, breach, business, cio, ciso, cloud, compliance, cyber, cybersecurity, data, defense, finance, governance, government, healthcare, identity, incident, incident response, infrastructure, insurance, jobs, military, network, regulation, resilience, risk, saas, service, skills, software, strategy, technology, threat, trainingWide-scale AI adoption shaking up skills sought: In terms of the skills wanted of today’s CSO, Fuller agrees that AI is the game-changer.”Organizations are seeking cybersecurity leaders who combine technical depth, AI fluency, and strong interpersonal skills,” Fuller says. “AI literacy is now a baseline expectation, as CISOs must understand how to defend against AI-driven…
-
Xerox FreeFlow Flaws Enable SSRF and Remote Code Execution
Xerox Corporation has released critical security updates for its FreeFlow Core software, addressing two significant vulnerabilities that could allow attackers to perform server-side request forgery (SSRF) attacks and achieve remote code execution on affected systems. The security flaws, identified as CVE-2025-8355 and CVE-2025-8356, affect FreeFlow Core version 8.0.4 and have been classified as >>IMPORTANT
-
Untersuchung der bisherigen Ransomware-Operationen der nicht-dokumentierten Gruppe STORM-2603
Check Point Research (CPR), die Sicherheitsforschungsabteilung von Check Point Software Technologies hat eine gezielte Analyse von Storm-2603 durchgeführt, einem Bedrohungsakteur, der mit den jüngsten Toolshell-Exploits in Verbindung steht und mit anderen chinesischen APT-Gruppen zusammenarbeitet. Storm-2603 nutzt ein benutzerdefiniertes Malware-Command-and-Control-Framework (C2), das von Angreifer intern als ak47c2 bezeichnet wird. Dieses Framework umfasst mindestens zwei verschiedene Arten…

