Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Commvault confirms that hackers operate CVE-2025-3928 as a zero day in violation of Azure
Global Security

Commvault confirms that hackers operate CVE-2025-3928 as a zero day in violation of Azure

AdminBy AdminMay 1, 2025No Comments2 Mins Read
Zero-Day in Azure Breach
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


01 May 2025Red LakshmananZero day / threat of intelligence

Zero day in violation of Azure

The Enterprise Data Commvault data platform showed that an unknown actor on the threat of a nation-state violated its Microsoft Azure Wednesday using CVE-2025-3928, but stressed that there is no evidence of unauthorized access to the data.

“This activity has affected the small number of customers we have in common with Microsoft and we work with these customers to assist,” the company – Note In updates.

“It is important to note that there has been no unauthorized access to customer backup data that Commvault retain and protect, and a significant impact on our businesses or our ability to deliver products and services.”

In the advice removed On March 7, 2025, Commvault stated that Microsoft was reported on February 20 about the unauthorized activity within its Azure conditions, and that the actor threatens the Cve-2025-3928 as a zero day. It also states that he had turned the victims and strengthened security measures.

The disclosure of information occurs when the US Cybersecurity Agency and CISA (CISA) added CVE-2025-3928 to its famous exploited vulnerabilities (KEV), which requires the Federal Civil Executive (FCEB) to apply the necessary Commvult web-server patches to 19 May 2025.

Cybersecurity

To mitigate the risk provided by such attacks, customers are advised to apply conditional access policies to all Microsoft 365, Dynamics 365, as well as registration of Azure AD applications, as well as turn and synchronize customers’ secrets between Azure and Commvault.

The company also urges users to follow the entry activities to identify any access attempts from IPs outside the ranges concerning the list. The following IP -ses were associated with malicious activity –

  • 108.69.148.100
  • 128.92.80.210
  • 184.153.42.129
  • 108.6.189.53, and
  • 159.242.42.20

“These IP addresses should be clearly blocked within your conditional access policies and are controlled in the Azure signing logs,” Commvault – Note. “If you have any attempts to access these IPS, please report the incident immediately in support of Commvault for further analysis and action.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.