Don’t Get Hooked by a SharePoint Phish: You’re Already Logged In

SharePoint phishing has become one of the most effective tactics used by attackers to compromise user credentials-and it's working because it looks familiar. If your team uses Microsoft 365, you're likely sharing and receiving SharePoint links regularly. That convenience is exactly what attackers are counting on. Here's the Red Flag: If someone shares a SharePoint document with you, you should not be prompted to log in again-especially if you're already signed in to Office 365 in your browser or desktop apps. If you're already authenticated, you shouldn't have to authenticate again. Phishing campaigns often mimic the Microsoft SharePoint sharing experience. They send a link that looks like a legitimate SharePoint document. But when you click the link, instead of seeing the document, you're redirected to a fake Microsoft login page. It looks real. It uses a Microsoft logo. It even may copy the same fonts and layout. But when you…

0 Comments

Palo Alto Networks Issues Multiple Security Updates Across Product Line

June 12, 2025 - Palo Alto Networks has released seven new security advisories detailing critical and medium-severity vulnerabilities affecting several of its core products, including GlobalProtect, PAN-OS, Prisma Access, and Cortex XDR. High-Severity: GlobalProtect for macOS - CVE-2025-4232 The most severe of the disclosed vulnerabilities is an improper wildcard neutralization flaw in GlobalProtect for macOS. Tracked as CVE-2025-4232, this vulnerability affects the application's log collection feature and could allow an authenticated attacker to escalate privileges to root via code injection. Chrome Fixes and Prisma Access Exposure In conjunction with internal updates, Palo Alto also implemented 11 recent Chrome-related security fixes, including a patch for CVE-2025-4233 - a cache vulnerability affecting the Prisma Access Browser. Command Injection Vulnerabilities in PAN-OS Two additional command injection flaws were identified in PAN-OS: CVE-2025-4231: Exploitable through the management web interface by an authenticated administrator with network access, allowing command execution as root. CVE-2025-4230: Exploitable via…

0 Comments

Ivanti & Fortinet Urge Immediate Patch of Critical RCE Flaws

Ivanti and Fortinet have released security updates to resolve over a dozen vulnerabilities across their platforms, including several rated high severity. Ivanti Vulnerabilities Ivanti published an update for Workspace Control (IWC) to address three high-severity vulnerabilities-CVE-2025-5353, CVE-2025-22463, and CVE-2025-22455. These flaws stem from hardcoded encryption keys present in IWC versions 10.19.0.0 and earlier, which could allow authenticated attackers to decrypt stored SQL credentials and environment passwords. Ivanti stated the issues were discovered through its responsible disclosure program and confirmed no active exploitation at the time of disclosure. Fortinet Vulnerabilities Fortinet released 14 security fixes this week, including one high-severity vulnerability and 13 rated medium severity. The critical issue, CVE-2025-31104, is an OS command injection flaw in FortiADC, allowing authenticated users to execute arbitrary code via specially crafted HTTP requests. Other affected products include: FortiOS FortiClientEMS / FortiClient for Windows FortiPAM FortiSRA FortiSASE FortiPortal FortiProxy FortiWeb The medium-severity vulnerabilities could lead…

0 Comments

Massive AT&T Data Leak Exposes 86 Million Customer Records with Decrypted SSNs

A newly disclosed breach has shaken the cybersecurity landscape: hackers have leaked a massive dataset containing over 86 million AT&T customer records, including decrypted Social Security Numbers (SSNs). Originally posted on a Russian cybercrime forum in May 2025 and reuploaded in early June, the dataset has now spread widely across threat actor channels. What's in the Leak? The exposed records contain: Full names Dates of birth Phone numbers Email addresses Physical addresses Approximately 44 million decrypted Social Security Numbers The threat actor claims that both SSNs and dates of birth were encrypted in the original source but have now been fully decrypted-indicating either a failure in encryption management or additional compromise. Possible Connection to Previous AT&T Breaches While AT&T has previously suffered data breaches, including the 2024 Snowflake-related breach affecting 110 million users' call and text metadata, this incident appears different. That earlier breach reportedly did not include personally identifiable…

0 Comments