Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA warns that there are widespread suspected SaaS attacks that exploit app secrets and cloud Misconfig
Identity

CISA warns that there are widespread suspected SaaS attacks that exploit app secrets and cloud Misconfig

userBy userMay 23, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 23, 2025Ravi LakshmananCloud Security/Vulnerability

Wide SaaS attacks

The US Cybersecurity and Infrastructure Security Agency (CISA) announced Thursday that Commvault is monitoring cyber threat activity targeting applications hosted in Microsoft Azure Cloud environments.

“The threat actor may have accessed the client secret for the Commvault (Metallic) Microsoft 365 (M365) Backup Software (SaaS) solution.

“This has led to a threat to unauthorized access to the M365 environment of Commvault customers, which has the secrets of the applications they store.”

CISA further noted that this activity could be part of a broader campaign targeting cloud infrastructures from various software (SAAS) providers with default configurations and high privileges.

The consultation comes just weeks after Commvault revealed that Microsoft notified the company in February 2025 of unauthorized activities caused by nation-state threat active within the Azure environment.

The incident discovered that threat actors were exploiting Zero Day Vulnerability (CVE-2025-3928).

“Based on industry experts, this threat actor will use sophisticated techniques to try to access the customer M365 environment,” Commvault said in the announcement. “This threat actor may have accessed a subset of the app credentials that a particular Commvault customer uses to authenticate the M365 environment.”

Cybersecurity

Commvault said it took several corrective actions, including rotating app credentials on the M365, but emphasized that there was no unauthorized access to customer backup data.

To mitigate such threats, CISA recommends that users and administrators follow the guidelines below:

Monitor ENTRA Audit Logs for unauthorized changes or additional entitlements to service principals initiated by Commvault Applications/Service Principals Microsoft Logs (ENTRA Audit, ENTRA Sign-in, Uniform Audit Log), and enforce internal threat hunting for single tenant apps, restrict conditional access policies. ENTRA’s application registration and service principal list allows businesses to trust access to the Commvault Management interface with management consent for higher privileges than business.

CISA, which added CVE-2025-3928 to its known exploited vulnerability catalog in late April 2025, said it continues to investigate malicious activities in collaboration with partner organizations.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDiffusedRive raises $3.5 million to solve the biggest challenges of physical AI: high quality training data
Next Article After Klarna, Zoom CEO will also use AI avatars in Quarterly Call
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Sequoia bets on silence | TechCrunch

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.