惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

WordPress大学
WordPress大学
Stack Overflow Blog
Stack Overflow Blog
M
Microsoft Research Blog - Microsoft Research
Jina AI
Jina AI
博客园 - 司徒正美
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
博客园 - 叶小钗
The GitHub Blog
The GitHub Blog
月光博客
月光博客
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
博客园 - 【当耐特】
Google DeepMind News
Google DeepMind News
Blog — PlanetScale
Blog — PlanetScale
有赞技术团队
有赞技术团队
A
About on SuperTechFans
G
Google Developers Blog
S
SegmentFault 最新的问题
李成银的技术随笔
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报

Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises | CSO Online

Police take down VPN service (this time with a good reason) Microsoft says it's making AI 'safe for work' in your browser Why your AI strategy stops where the PLC starts: Hard lessons from the OT frontlines Identity as the primary attack surface: What modern breaches are really exploiting Google folds CodeMender into agent ecosystem amid push for AI-led AppSec Critical vulnerability in Cisco Secure Workload rated at maximum severity Microsoft patches two zero-day flaws in Defender Unpatched ChromaDB flaw leaves servers open to remote code execution Microsoft releases open-source tools to operationalize AI agent safety AI becoming an SOC imperative for curtailing emerging cyber threats Microsoft is working on a patch for 'YellowKey' attack on Bitlocker, offers temporary fix Drupal admins rushing to patch maximum severity SQL injection vulnerability GitHub admits major source code leak after 3,800 internal repositories breached SHub Reaper impersonates Apple, Google, and Microsoft in one MacOS attack chain Why some security fixes never reach your vulnerability dashboard Microsoft disrupts malware code-signing service used by ransomware gangs Contractor’s public GitHub account exposed GovCloud and CISA credentials AntV data visualization tool the latest to be hit by ongoing npm supply chain attacks GitHub scales back bug bounties, reminds users security is their responsibility too Internet Explorer may be dead, but its ghost still runs malware 7 tips for accelerating cyber incident recovery SIEM-Kaufratgeber Schwachstellen managen: Die besten Vulnerability-Management-Tools Security-Infotainment: Die besten Hacker-Dokus Microsoft May security patch fails for some due to boot partition size glitch AI cyberattackers are getting better faster New image-based prompt injection attack targets multimodal AI models ‘Patched’ Windows bug resurfaces 6 years later as working SYSTEM-level exploit AI coding is fueling a secrets-sprawl crisis few CISOs are containing Why the best security investment a board can make in 2026 isn’t another tool Expired domain leads to supply chain attack on node-ipc npm package Exchange Server zero-day vulnerability can be triggered by opening a malicious email Cisco warns of an actively exploited SD-WAN flaw with max severity Autonomous systems are finally working. Security is next EU’s Cyber Resiliency Act will put IT leaders to the test The economics of ransomware 3.0 AI agent finds 18-year-old remote code execution flaw in Nginx Meet Fragnesia, the third Linux kernel vulnerability in a month FlowerStorm phishing gang adopts virtual-machine obfuscation to evade email defenses PraisonAI vulnerability gets scanned within 4 hours of disclosure What CISOs need to land a board role Fired employee sought AI help to hide deletion of hosting firm’s customer data Fortinet fixes two critical RCE flaws in FortiAuthenticator and FortiSandbox What happens when China’s AI catches up to Mythos? Microsoft’s new AI system finds 16 Windows flaws, including four critical RCEs Palo Alto bets on identity security for autonomous AI with Idira launch ClickFix finds a backup plan in PySoxy proxy chains CISA’s AI SBOM guidance pushes software supply-chain oversight into new territory 2026 CSO Award winners showcase business-enabling cyber innovation Google entdeckt erstmals KI-basierten Zero-Day-Exploit Der Kaufratgeber für Breach & Attack Simulation Tools May Patch Tuesday roundup: Critical holes in Windows Netlogon, DNS, and SAP S/4HANA Mistral AI SDK, TanStack Router hit in npm software supply chain attack OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos Fake Claude Code takes the IElevator to your browser secrets cPanel flaw exposes enterprises to hosting supply-chain risks Developer workstations are the new beachhead CISOs step into the AI spotlight Why patching SLAs should be the floor, not the strategy Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen Customer Identity & Access Management: Die besten CIAM-Tools Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched Entries now open for the 2026 CSO30 Australia Awards Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program Google discovers weaponized zero-day exploits created with AI Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads New ‘Dirty Frag’ exploit targets Linux kernel for root access AI security is repeating endpoint security's biggest mistake 8 guiding principles for reskilling the SOC for agentic AI 1,800+ MCP servers exposed without authentication: How zero trust can secure the AI agent revolution Five new holes, one exploited, found in Ivanti Endpoint Manager Mobile Claude in Chrome is taking orders from the wrong extensions Your CTEM program is probably ignoring MCP. Here’s how to fix it Pen tests show AI security flaws far more severe than legacy software bugs Your refresh plan has a CVE blind spot Become a millionaire by bug hunting on Android 13 new critical holes in JavaScript sandbox allow execution of arbitrary code Ollama vulnerability highlights danger of AI frameworks with unrestricted access LinkedIn illegally blocking free accounts from seeing 'who's viewed your profile' data, group alleges Bots in translation: Can AI really fix SIEM rule sprawl across vendors? Critical Palo Alto Networks software bug hits exposed firewalls CISOs: Align cyber risk communication with boardroom psychology Ten years later, has the GDPR fulfilled its purpose? US government agency to safety test frontier AI models before release Iranian state-backed spies pose as ransomware slingers in false flag attacks New malware turns Linux systems into P2P attack networks Poisoned truth: The quiet security threat inside enterprise AI Train like you fight: Why cyber operations teams need no-notice drills Die besten DAST- & SAST-Tools Supply-chain attacks take aim at your AI coding agents Edge browser leaves passwords exposed in plain text, says researcher CISA mulls new three-day remediation deadline for critical flaws CISA pushes critical infrastructure operators to prepare to work in isolation Oracle will patch more often to counter AI cybersecurity threat AI finds 20-year-old bugs in PostgreSQL and MariaDB Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs CISOs step up to the security workforce challenge Why most zero-trust architectures fail at the traffic layer 10 Anzeichen für einen schlechten CSO Anthropic Mythos spurs White House to weigh pre-release reviews for high-risk AI models
FBI warns of Kali Oauth stealers
2026-05-23 · via Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises | CSO Online

The FBI has warned of the danger from a new wave of phishing attacks generated by a tool called Kali365.

It enables cyber criminals to obtain Microsoft 365 access tokens and bypass multi-factor authentication (MFA) protocols without intercepting the user’s credentials by capturing Oauth tokens linked to the victim’s Microsoft 365 account.

The scam works in a similar way to most phishing attacks. An attacker sends an email purporting to be from a trusted cloud document sharing service, including instructions to enter a particular code on a legitimate Microsoft site.

The code, however, authorizes the attacker’s device to access the victim’s Microsoft account.

The FBI has issued a set of instructions for IT security managers to help mitigate the Kali365 attack before it affects their users. These include creating a conditional access policy to block code flow for all users, with exceptions for the necessary business processes. Managers should also block authentication transfer policies, preventing users from handing over their access rights from a corporate PC to a mobile device.

Phishing remains a major threat for organizations. According to a World Economic Forum report from January this year, CEOs worldwide see it as the main security threat. It’s also something that is not going away, 77 percent of organizations think that the number of phishing attacks has increased in the past year. Kali365 has just added to that number.