• MEDIA KIT
  • E-PAPER
  • RADIO VOICE
  • AWAAZ
  • VNN
  • CONTACT
Wednesday, October 4, 2023
Newsletter
No Result
View All Result
Weekly Voice
  • Canada
  • India
  • World
  • Business
  • Lifestyle
  • Tech
  • Auto
  • Sports
  • Food
Weekly Voice
  • Canada
  • India
  • World
  • Business
  • Lifestyle
  • Tech
  • Auto
  • Sports
  • Food
No Result
View All Result
Weekly Voice
No Result
View All Result
ADVERTISEMENT
Home Tech

Google Workspace bug allows untraceable data theft from Drive files

by Voice
June 5, 2023
in Tech
Reading Time: 2 mins read
Google Workspace bug allows untraceable data theft from Drive files
Share on FacebookShare on TwitterShare on Whatsapp

 

San Francisco, June 5 (VOICE) Cybersecurity researchers have discovered a significant forensic security deficiency in Google Workspace that enables a hacker to exfiltrate data in Google Drive without any trace.

According to researchers from Mitiga Security, once a malicious user inside has accessed the organisation’s Google Drive, they can take action without being recorded at all.

This flaw affects only users who do not have a paid enterprise licence for Google Workspace.

Users who do not have a paid Google Workspace licence have their private drive actions left undocumented.

Hackers can disable logging and recording by cancelling their paid licence and switching to the free “Cloud Identity Free” licence.

ADVERTISEMENT

This enables threat actors to exfiltrate files without leaving any trace, save for the indication that a paid licence was revoked, which is visible to administrators.

“A threat actor who gains access to an admin user can revoke the user’s license, download all their private files, and reassign the license,” the researchers said.

The experts also notified Google of its findings, who is yet to respond.

Meanwhile, hackers are targeting iPhones with previously unknown malware, via iMessage to, gain complete control over the iOS device and spy on users.

Cybersecurity company Kaspersky discovered the mobile Advanced Persistent Threat (APT) campaign targeting iOS devices with previously unknown malware.

Dubbed as ‘Operation Triangulation’, the ongoing campaign distributes zero-click exploits via iMessage to run malware gaining complete control over the device and user data, with the final goal to “hiddenly spy on users”.

Related Posts

Tech

Grimes sues Musk for not letting her see one of their 3 children

October 4, 2023
Tech

Amazon used a secret algorithm to raise prices: Report

October 4, 2023
Tech

Parag Agrawal and team win $1.1 mn in legal fees from Musk’s X

October 4, 2023
Tech

upGrad’s Co-founder Mayank Kumar quits as India edtech consortium chair

October 3, 2023
Tech

LinkedIn bets big on AI to help recruiters find suitable candidates

October 3, 2023
Tech

New headband to catch early signs of Alzheimer’s while you sleep

October 3, 2023
Load More
ADVERTISEMENT
ADVERTISEMENT
India

NewsClick row: Delhi court sends founder Prabir Purkayastha, HR head to 7-day police custody

October 4, 2023
Tech

Grimes sues Musk for not letting her see one of their 3 children

October 4, 2023
Sports

Asian Games: Jyothi, Ojas excel as India win Compound Mixed Team gold, achieve highest-ever medal haul

October 4, 2023
India

ED raids AAP MP Sanjay Singh’s residence in Delhi liquor scam case (Lead)

October 4, 2023
India

Delhi man stabbed multiple times, head crushed

October 4, 2023
NEWS

Kevin McCarthy says won’t run for US House Speaker again after ouster in historic vote (Ld)

October 4, 2023
  • COMMUNITY GUIDELINES
  • CONTACT
  • Newsletter
Reach Us: Info@weeklyvoice.com

Copyright © 2023. All Rights Reserved By weeklyvoice.com

No Result
View All Result
  • Canada
  • India
  • World
  • Business
  • Lifestyle
  • Tech
  • Auto
  • Sports
  • Food

Copyright © 2023. All Rights Reserved By weeklyvoice.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist