Upcoming Virtual Event: Cloud Security Summit | July 17 - Register Now
Connect with us

Hi, what are you looking for?



In Other News: Microsoft Email Spoofing, Snowflake Hack Ransoms, LogoFail Follow-Up

Noteworthy stories that might have slipped under the radar: Microsoft email spoofing vulnerability, Snowflake hack victims get ransom demands, LogoFail still around.

Cybersecurity News tidbits

SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar.

We provide a valuable summary of stories that may not warrant an entire article, but are nonetheless important for a comprehensive understanding of the cybersecurity landscape.

Each week, we curate and present a collection of noteworthy developments, ranging from the latest vulnerability discoveries and emerging attack techniques to significant policy changes and industry reports. 

Here are this week’s stories:  

Cybercriminals demanding up to $5 million from hacked Snowflake customers

The cybercriminals who used stolen credentials to target Snowflake cloud storage system customers are now demanding payments of between $300,000 and $5 million from victims, according to Mandiant. There are at least 10 companies from which the hackers demanded a ransom. 

Most organizations experienced API security problems

A survey by Salt Security showed that a vast majority of organizations have experienced security problems in production APIs. Two-thirds of organizations are managing over 100 APIs and the threat of API attacks is growing, but only 7.5% of organizations consider their API security programs to be ‘advanced’.

Advertisement. Scroll to continue reading.

NSO Group believes military and government officials are fair targets for its spyware

As part of the lawsuit filed by WhatsApp against NSO Group, the Israeli spyware firm admitted that military and government officials may be targeted using its products. The company has previously highlighted that its products are designed to investigate and prevent crimes and terrorism, but in a new court filing NSO said its technology can be used on “persons who, by virtue of their positions in government or military organizations, are the subject of legitimate intelligence investigations.”     

Google starts using Bugcrowd for bug bounty payments

Bounty payments for Google’s bug hunting community will be processed through the Bugcrowd platform. Bug bounty hunters who are already registered with Google can easily switch to Bugcrowd by registering on bugcrowd.com and updating their payment preference. 

Vulnerability allows Microsoft employee email spoofing

A researcher claims to have found a vulnerability that can be exploited to spoof Microsoft employee email addresses, which could be very useful for phishing attacks. The issue has been reported to the tech giant, but the researcher says it remains unpatched after the company was unable to reproduce the bug. 

EU delays vote on encrypted message scanning

The EU has postponed a vote on a law that would require messaging services such as Signal and WhatsApp to scan media files and links sent by users for potential child abuse materials. Signal warned this week that this ‘upload moderation’ still undermines end-to-end encryption, just like the encryption backdoors long requested by governments. 

CISA releases SSO guidance for SMBs

CISA has released new guidance to help small and medium-sized businesses with the adoption of Single Sign-On (SSO). Titled ‘Barriers to Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: Identifying Challenges and Opportunities’, the document is designed to help organizations overcome challenges and improve their security. 

Consulting companies pay $11 million for cybersecurity failures

The Department of Justice announced that two consulting companies, Guidehouse and Nan McKay, have paid a total of more than $11 million for failing to meet cybersecurity requirements when fulfilling government contracts. 

Analysis of ONNX Store phishing-as-a-service platform 

EclecticIQ has conducted an analysis of a phishing-as-a-service platform called ONNX Store that has been used by cybercriminals in campaigns targeting financial institutions.

LogoFAIL vulnerabilities still haunt many consumer and enterprise devices

In December 2023, firmware security company Binarly disclosed the details of an attack method dubbed LogoFAIL that can be used to compromise many consumer and enterprise devices by leveraging malicious UEFI logo images. Binarly has now published over 30 of its LogoFAIL vulnerability advisories and warned that hundreds of device models are still impacted. 

Google Project Zero framework for LLM-assisted vulnerability research

Google’s Project Zero has unveiled Project Naptime, a framework for LLM-assisted vulnerability research. Google says the framework can achieve significantly better performance in vulnerability discovery. 

Microsoft Power BI exposes sensitive data

Nokod has found a data leakage vulnerability in the Microsoft Power BI service. The security firm says the issue, which could affect tens of thousands of organizations, can allow attackers to access sensitive information such as employee and business data, and personally identifiable information.  

Related: In Other News: TikTok Zero-Day, DMM Bitcoin Hack, Free VPN App Analysis

Related: In Other News: Fuxnet ICS Malware, Google User Tracking, CISA Employee Scams 

Written By


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.


Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.


People on the Move

Craig Boundy has left Experian to join McAfee as President and CEO.

Forcepoint has promoted Ryan Windham from Chief Customer and Strategy Officer to Chief Executive Officer.

ICS and OT cybersecurity solutions provider TXOne Networks appointed Stephen Driggers as its new CRO.

More People On The Move

Expert Insights