OAuth Attacks Target Microsoft 365 & GitHub

OAuth Attacks Target Microsoft 365, GitHub: A Deep Dive into the Latest Threats

Ongoing cyberattacks are exploiting the OAuth protocol on platforms like Microsoft 365 and GitHub. Cybercriminals are using deceptive tactics with fake applications mimicking trusted brands such as Adobe, DocuSign, and even GitHub itself. These malicious apps trick users into granting broad permissions, enabling attackers to gain persistent access and potentially redirect victims to phishing sites or deploy further attacks, targeting sectors with sensitive data. Organizations are advised to implement strong security measures, including limiting app permissions, employing conditional access policies, regularly auditing applications, and educating users to recognize these evolving threats. ... Read More
MalDoc in PDF

MalDoc in PDF: How Attackers Use Word Files in PDFs to Evade Security

Cyberattack method called MalDoc in PDF, where malicious Word files are concealed within seemingly harmless PDF documents to bypass security defenses. This technique exploits the dual nature of the file; when opened with a PDF reader, it appears benign, but opening it with Microsoft Word triggers embedded malicious macros that can compromise systems. Traditional security measures often fail to detect this threat because they primarily analyze the PDF structure and may overlook the embedded Word components. The document outlines how this attack works, its dangers, methods for detection using tools like OLEVBA and YARA rules, and preventative measures such as disabling automatic macros and strengthening email security. ... Read More
California Cryobank Data Breach

California Cryobank Confirms Data Breach: Sensitive Information Potentially Compromised

California Cryobank (CCB) has confirmed a data breach in March 2025 impacting an unknown number of U.S. residents. The breach, detected in April 2024, potentially compromised sensitive personal and financial data, including Social Security numbers and financial account details, raising concerns about biometric data exposure. CCB is offering affected individuals one year of free credit monitoring. Law firms are investigating potential class action lawsuits due to concerns of negligence in data security. Individuals are advised to take steps to protect themselves, such as enrolling in credit monitoring and freezing their credit. The article also includes a cybersecurity company, Technijian, promoting its services in light of the breach. ... Read More
GitHub Supply Chain Attack: CI/CD Secrets Exposed

GitHub Supply Chain Attack Exposes 23,000 Repositories – What You Need to Know

A significant supply chain attack on GitHub compromised approximately 23,000 repositories by exploiting a popular GitHub Action. The attackers tampered with the tj-actions/changed-files Action to steal sensitive CI/CD secrets from build logs. This incident underscores the growing threats to open-source security, necessitating immediate action from developers to rotate secrets and adopt more secure practices. The article details the attack's timeline, impact, and crucial steps for users to secure their GitHub repositories and CI/CD pipelines, emphasizing the shared responsibility in maintaining a secure development ecosystem. ... Read More
T-Mobile Data Breach Settlement 2025

T-Mobile Data Breach Settlement 2025: Check Amount, Eligibility, How to Claim Your Compensation

In 2021, T-Mobile experienced a significant data breach compromising the sensitive information of approximately 76 million customers. To address this, T-Mobile agreed to a $350 million settlement to compensate affected individuals. Eligible customers, who had an account before August 1, 2021, and filed a claim by January 23, 2023, can receive reimbursement for out-of-pocket losses, compensation for lost time, or an alternative cash payment, with payments expected to begin in April 2025. Beyond monetary compensation, T-Mobile offered affected customers two years of free identity protection services. The incident underscores the critical importance of data security, with a concluding note from a cybersecurity company offering its protective services. ... Read More