Aggregator
CVE-2010-1230 | Google Chrome up to 4.0.249.0 information disclosure (Nessus ID 45086 / ID 117083)
CVE-2010-1231 | Google Chrome up to 2.0.172.32 Remote Code Execution (Nessus ID 45086 / ID 117083)
CVE-2025-70067 | Assimp up to 6.0.2 FBX File AddBinaryProperty buffer overflow
CVE-2026-6266 | Red Hat Ansible Automation Platform up to 2.6 authentication bypass (RHSA-2026:13508)
Top 3 takeaways for security leaders
Вирус с легальной подписью. DigiCert взломали, и теперь «проверено антивирусом» — это не гарантия
Wiz ZeroDay.Cloud Event Reveals 20-Year-Old PostgreSQL Vulnerabilities
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated messages from attacker-controlled domains.
The post Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise appeared first on Microsoft Security Blog.
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
Microsoft Defender Research observed a large-scale credential theft campaign that exemplifies this trend, using code of conduct-themed lures, a multi-step attack chain, and legitimate email services to distribute fully authenticated messages from attacker-controlled domains.
The post Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise appeared first on Microsoft Security Blog.