Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Confusion sees India as a shortcut in competition with OpenAs

Humanity will strengthen limits on the use of Claude Code without telling it to users

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA warns that there are widespread suspected SaaS attacks that exploit app secrets and cloud Misconfig
Identity

CISA warns that there are widespread suspected SaaS attacks that exploit app secrets and cloud Misconfig

userBy userMay 23, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 23, 2025Ravi LakshmananCloud Security/Vulnerability

Wide SaaS attacks

The US Cybersecurity and Infrastructure Security Agency (CISA) announced Thursday that Commvault is monitoring cyber threat activity targeting applications hosted in Microsoft Azure Cloud environments.

“The threat actor may have accessed the client secret for the Commvault (Metallic) Microsoft 365 (M365) Backup Software (SaaS) solution.

“This has led to a threat to unauthorized access to the M365 environment of Commvault customers, which has the secrets of the applications they store.”

CISA further noted that this activity could be part of a broader campaign targeting cloud infrastructures from various software (SAAS) providers with default configurations and high privileges.

The consultation comes just weeks after Commvault revealed that Microsoft notified the company in February 2025 of unauthorized activities caused by nation-state threat active within the Azure environment.

The incident discovered that threat actors were exploiting Zero Day Vulnerability (CVE-2025-3928).

“Based on industry experts, this threat actor will use sophisticated techniques to try to access the customer M365 environment,” Commvault said in the announcement. “This threat actor may have accessed a subset of the app credentials that a particular Commvault customer uses to authenticate the M365 environment.”

Cybersecurity

Commvault said it took several corrective actions, including rotating app credentials on the M365, but emphasized that there was no unauthorized access to customer backup data.

To mitigate such threats, CISA recommends that users and administrators follow the guidelines below:

Monitor ENTRA Audit Logs for unauthorized changes or additional entitlements to service principals initiated by Commvault Applications/Service Principals Microsoft Logs (ENTRA Audit, ENTRA Sign-in, Uniform Audit Log), and enforce internal threat hunting for single tenant apps, restrict conditional access policies. ENTRA’s application registration and service principal list allows businesses to trust access to the Commvault Management interface with management consent for higher privileges than business.

CISA, which added CVE-2025-3928 to its known exploited vulnerability catalog in late April 2025, said it continues to investigate malicious activities in collaboration with partner organizations.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDiffusedRive raises $3.5 million to solve the biggest challenges of physical AI: high quality training data
Next Article After Klarna, Zoom CEO will also use AI avatars in Quarterly Call
user
  • Website

Related Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

July 17, 2025

Hackers exploit flaws in apache http server to deploy linuxsys cryptocurrency miner

July 17, 2025

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

July 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Confusion sees India as a shortcut in competition with OpenAs

Humanity will strengthen limits on the use of Claude Code without telling it to users

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Openai launches a general purpose agent with ChatGpt

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.