theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
V
vulnerability

CVE-2024-XXXX: Surge in OAuth 2.0 Device Code Phishing Attacks Exploiting Device Authorization Grant Flow

Device code phishing attacks exploiting OAuth 2.0 Device Authorization Grant flow have increased over 37 times this year, enabling attackers to hijack cloud accounts. Organizations must apply vendor patches, enforce MFA, and monitor OAuth logs to mitigate this rising threat.

BleepingComputer·6h ago·2 min read
Read full story
Allvulnerability77policy17malware16breach6apt5ransomware2
Aapt

TA416 Resurges with Targeted Attacks on European Government and Diplomatic Entities Since Mid-2025

Since mid-2025, the China-aligned threat actor TA416 has resumed targeting European government and diplomatic organizations after a two-year lull. The group employs spear-phishing, exploits Microsoft Office vulnerabilities, and uses multi-stage malware to conduct espionage. Detection and defense require patch management, email filtering, and endpoint monitoring.

The Hacker News·1d ago·2 min read
Bbreach

Supply Chain Attacks Linked to TeamPCP Amplified by ShinyHunters and Lapsus$ Involvement

Organizations have disclosed breaches stemming from TeamPCP's supply chain compromise, with threat actors ShinyHunters and Lapsus$ claiming involvement. These attacks exposed sensitive data through injected malicious code in software updates, affecting numerous enterprises. Affected users should audit software integrity, reset credentials, and enable multi-factor authentication.

Dark Reading·1d ago·2 min read
Ppolicy

Microsoft and CrowdStrike Forge Partnership After Years of Rivalry Fueled by Formula 1 Collaboration

Microsoft and CrowdStrike have shifted from competitors to partners through a collaboration rooted in their shared involvement in Formula 1. This alliance integrates their cybersecurity tools and threat intelligence, enhancing protection for enterprise customers. Organizations using both platforms should prepare to leverage combined capabilities and update configurations accordingly.

Dark Reading·1d ago·2 min read