![]() Then, the group would comb through office collaboration tools such as SharePoint, Teams and Slack to discover other users on the network whose accounts could be targeted to deepen the compromise. In the past, Microsoft said, Lapsus$ has sought to steal individual user credentials to gain access to an organization or corporate network. ![]() Microsoft added that the techniques Lapsus$ used in the attack on company systems were consistent with those Microsoft has observed the group using against other targets. “Microsoft does not rely on the secrecy of code as a security measure and viewing source code does not lead to elevation of risk,” Microsoft said. Nvidia confirmed a breach to CNN earlier this month following Lapsus$’s claim.Īddressing claims by Lapsus$ that the group had stolen Microsoft source code, the technology giant said Tuesday that Microsoft’s approach to risk management means the possession of the code would not benefit the hackers even if they had managed to access it. Lapsus$ previously claimed to have breached chip giant Nvidia. On Tuesday evening, following an investigation into those claims, Okta acknowledged that hundreds of its customers may have been affected by a breach in January linked to one of Okta’s outside contractors. The disclosure comes after Lapsus$ claimed credit for compromising Okta, the widely used digital identity management firm. “Our cybersecurity response teams quickly engaged to remediate the compromised account and prevent further activity,” Microsoft said in the post. Okta concedes hundreds of clients could be affected by breach Photographer: Tiffany Hagler-Geard/Bloomberg via Getty Images Tiffany Hagler-Geard/Bloomberg/Getty Images is scheduled to release earnings figures on March 3. website on a smartphone arranged in Dobbs Ferry, New York, U.S., on Sunday, Feb.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |