Microsoft defenders say intruders used exposed SolarWinds Web Help Desk (WHD) instances as a beachhead in December, then moved laterally to harvest high‑privilege credentials — but the exact bug that opened the door remains unresolved.
Background
SolarWinds Web Help Desk is a widely deployed IT...
Microsoft and U.S. cyber authorities have issued an emergency-style alarm after a fast-moving, self-replicating supply‑chain worm — now widely discussed as Shai‑Hulud 2.0 — began executing during npm package installation, harvesting developer and cloud credentials and propagating automatically...
Keeper Security’s new Forcefield lands as a direct countermeasure to one of the fastest-growing attack vectors on Windows endpoints: memory-based credential theft and in-memory “infostealer” malware that scrapes browsers, extensions and running apps for secrets.
Background
Memory-based attacks...
A fast-moving, self‑replicating supply‑chain worm dubbed Shai‑Hulud has poisoned hundreds of npm packages and is actively targeting developer credentials and cloud service keys tied to Google Cloud, Amazon Web Services, and Microsoft Azure — a campaign so severe that national and vendor security...
A fast-moving, self‑replicating supply‑chain worm has infiltrated the npm ecosystem, harvesting developer credentials and using stolen tokens to republish trojanized packages that in turn spread the infection — a campaign now tracked as “Shai‑Hulud” that security teams and national agencies warn...
A self‑propagating worm has struck the npm ecosystem, infecting hundreds of JavaScript packages and turning developer machines and CI pipelines into an automated propagation platform that harvests and publishes credentials—an event that elevates the attack surface of modern software supply...
Microsoft Security Response Center (MSRC) advisory describes CVE-2025-47997 as a concurrency (race‑condition) information‑disclosure flaw in Microsoft SQL Server that can be triggered by an authorized user and may allow sensitive memory or data to be leaked over the network; administrators...
Rockwell Automation’s ThinManager has been flagged for a high-severity Server-Side Request Forgery (SSRF) flaw that can expose an industrial control system’s ThinServer service account NTLM credentials, according to a federal advisory reissued on September 9, 2025. The vulnerability—tracked...
Two German researchers demonstrated at Black Hat that an attacker with local administrative access can inject a malicious biometric template into Windows Hello for Business and sign in as another user with nothing more than their own face — a practical, low-noise bypass that undermines one of...
admin rights
biometrics
credentialtheft
device authentication
edr detection
enterprise security
ess
faceplant
passwordless authentication
secure by design
secure sign-in
security architecture
tpm
virtualization
wbs
windows biometric service
windows hello for business
Security researchers have uncovered a targeted supply‑chain campaign — dubbed “Solana‑Scan” — in which malicious npm packages masquerading as Solana SDK utilities are being used to harvest developer credentials, wallet keyfiles and other high‑value artifacts from developer machines. Background /...
Microsoft's security update for a Windows File Explorer flaw underscores a long-standing risk vector: trusted UI components that implicitly parse untrusted content. In March 2025 Microsoft disclosed and patched a Windows File Explorer spoofing vulnerability that could cause Explorer to...
A new wave of highly sophisticated phishing scams has placed millions of Microsoft 365 users at increased risk, with recent campaigns focusing on colleges and universities such as Seton Hall. These scams exploit a deepening trust in digital communications and modern security tools, employing...
A newly disclosed exploit chain targeting Microsoft SharePoint servers is sending shockwaves across enterprise IT and cybersecurity circles, revealing a sophisticated blend of zero-day and known vulnerabilities that enable cyber attackers to gain near-total control of systems. Security agencies...
An alarming new wave of cybercrime has emerged, leveraging the very security tools designed to shield organizations from harm. Recent research reveals that phishing actors are now abusing link-wrapping and URL-rewriting services—trusted pillars of enterprise email protection—to sneak malicious...
Cybercriminals have developed a sophisticated method to compromise Microsoft 365 accounts by exploiting link-wrapping services, notably those provided by Proofpoint and Intermedia. This technique involves manipulating the very tools designed to protect users, thereby increasing the effectiveness...
A new wave of cyberattacks has exposed a dangerous flaw in trusted email security services, as hackers have successfully exploited protective link-wrapping features to orchestrate large-scale phishing campaigns targeting Microsoft 365 logins. By hijacking the mechanisms designed to keep users...
Cloudflare has issued a stark warning about a new and highly sophisticated wave of phishing attacks targeting Microsoft 365 users, drawing attention to a dangerous exploitation of a trusted email security feature: link wrapping. In recent weeks, both enterprise and consumer accounts have come...
A wave of highly sophisticated phishing attacks has put Microsoft 365 users—and the very foundations of modern email security—at risk, exposing a perilous paradox: the same technologies designed to protect cloud productivity platforms are now being systematically exploited to facilitate...
A sophisticated phishing campaign exploiting trusted email security tools has rattled the cybersecurity landscape, exposing a dismally clever strategy that turns protective mechanisms into attack vectors. Between June and July 2025, researchers at Cloudflare uncovered an operation wherein...
Attackers have found a chillingly effective way to subvert defenses integrated into the heart of enterprise email security. According to new research from Cloudflare, threat actors are actively exploiting “link wrapping” services—offered by reputable vendors like Proofpoint and Intermedia—to...