Microsoft varnar för hackare som utnyttjar lösenordsåterställningar

Microsoft har varnat användare för att hackare riktar in sig på processer för lösenordsåterställning för att komma åt konton. Aktiviteten tillskrivs gruppen Storm-2949.

Microsoft utfärdade varningen gällande pågående försök att utnyttja lösenordsåterställningar för obehörig åtkomst. Hackarna beskrivs driva en metodisk, sofistikerad och flerskiktad kampanj under namnet Storm-2949.

Relaterade artiklar

Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Bild genererad av AI

Iran-linked hackers disrupt Stryker's network in apparent retaliation

Rapporterad av AI Bild genererad av AI

A cyberattack attributed to the Iran-aligned Handala Hack group has disrupted the Microsoft environment of medical device maker Stryker, paralyzing much of its global operations. The incident, which emerged shortly after US and Israeli airstrikes on Iran, involved data wiping across tens of thousands of computers. Stryker confirmed the attack is contained, with no impact on its critical medical devices.

Security specialists have raised alarms over the vulnerability of online accounts, stating that almost half of all passwords in use today can be broken within minutes.

Rapporterad av AI

Security researchers have flagged a new risk to users of Microsoft's Phone Link application. An unidentified threat actor is using the tool to steal SMS messages and one-time passwords.

Journalists reported mysterious phishing attempts by unknowns a few weeks ago. The Dutch secret service now holds Russia responsible for attacks on the messaging apps WhatsApp and Signal. The report explains how the attacks work and how users can protect themselves.

Rapporterad av AI

Google published proof-of-concept exploit code on Wednesday for a vulnerability in its Chromium browser that has gone unfixed for 29 months. The flaw affects Chrome, Microsoft Edge, and other Chromium-based browsers used by millions worldwide. It enables attackers to establish persistent connections for monitoring user activity and launching attacks.

Denna webbplats använder cookies

Vi använder cookies för analys för att förbättra vår webbplats. Läs vår integritetspolicy för mer information.
Avböj