One Article Review

Accueil - L'article:
Source TechRepublic.webp TechRepublic
Identifiant 5193988
Date de publication 2022-06-16 15:44:57 (vue: 2022-06-16 16:08:08)
Titre \'Potentially dangerous\' Office 365 flaw discovered (Recyclage)
Texte >Proofpoint says the piece of functionality allows ransomware to encrypt files stored on Microsoft SharePoint and OneDrive.
Envoyé Oui
Condensat 365 >proofpoint allows dangerous discovered encrypt files flaw functionality microsoft office onedrive piece potentially ransomware says sharepoint stored
Tags Ransomware
Stories
Notes
Move


Les reprises de l'article (1):
Source The_Hackers_News.webp The Hacker News
Identifiant 5187454
Date de publication 2022-06-16 03:05:49 (vue: 2022-06-16 11:06:59)
Titre A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage
Texte A "dangerous piece of functionality" has been discovered in Microsoft 365 suite that could be potentially abused by a malicious actor to ransom files stored on SharePoint and OneDrive and launch attacks on cloud infrastructure. The cloud ransomware attack makes it possible to launch file-encrypting malware to "encrypt files stored on SharePoint and OneDrive in a way that makes them unrecoverable
Envoyé Oui
Condensat 365 abused actor attack attacks been cloud could dangerous discovered encrypt encrypting feature file files functionality hackers has help hold hostage infrastructure launch makes malicious malware microsoft office onedrive piece possible potentially ransom ransomware sharepoint stored suite them unrecoverable way
Tags Ransomware Malware
Stories
Notes
Move


L'article ressemble à 1 autre(s) article(s):
Src Date (GMT) Titre Description Tags Stories Notes
no_ico.webp 2022-06-17 15:06:57 (Déjà vu) Dangerous Microsoft Office 365 Functionality That Can Store Ransom Files On SharePoint And OneDrive (lien direct) Proofpoint has discovered a potentially dangerous piece of functionality in Office 365 or Microsoft 365 that allows ransomware to encrypt files stored on SharePoint and OneDrive in a way that makes them unrecoverable without dedicated backups or a decryption key from the attacker. The research focused on two of the most popular enterprise cloud apps – […] Ransomware
My email: